General

  • Target

    eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536

  • Size

    481KB

  • MD5

    b05dc02b630924cb951e5e999269a9e7

  • SHA1

    49f6d0beca33af85e8a5ba64aa9e848ce250188b

  • SHA256

    eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536

  • SHA512

    2a2cf9bfa42fe91a1d3db533653f531625e43effb0f169567e411a435f6b1c0998a4329559648e5d864b7333cd8230abc8a5b39df91fa3309ac88dd6f0e3342c

  • SSDEEP

    6144:ln57dKJSu3MkHUsgOPTNGQOPNSY0HACVDroae/R4W7BFbI5DOAj:l570JD3MERPpLOlSY0HND7e/OW7BZD

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536
    .exe windows x64

    4ed5dfc8ec9520fe86d07e7f7705a8a3


    Code Sign

    Headers

    Imports

    Sections