General

  • Target

    e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470

  • Size

    5.5MB

  • MD5

    dbe95482a73c63d5b3d1d16aa3ad8f21

  • SHA1

    4bba60ff11f8b150b004960c658ad74a707ebcea

  • SHA256

    e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470

  • SHA512

    2f6795a956873a35cc14949f707b51438579fd08cc02e05b17e69628b20d9207863bbc443b670464cbe052a620ecc7bb350e53d9cde5cabbeb266eea049cc3ed

  • SSDEEP

    12288:3JrPPkZsPnAbAh9s0LLN5JjQFpiuSyfy6CHyBPL:3tPasYbA/tHyB

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470
    .exe windows x86

    997b737b4c2551d93f537231165667fd


    Code Sign

    Headers

    Imports

    Sections