General

  • Target

    aa2e06be6aed2cf9a4445cc3a239fb87e069e5e693c555e1e2a651970f725af5

  • Size

    272KB

  • MD5

    0bb5cb4fbbca83140bb69bbd5421b276

  • SHA1

    26092cebf3f892fcc32c0dc311718901ee3fcb42

  • SHA256

    aa2e06be6aed2cf9a4445cc3a239fb87e069e5e693c555e1e2a651970f725af5

  • SHA512

    0433842b1e76545485431787ce4e127f40d835506a6b26328da6e217755974012ae37579dccd10273a8668d3391eca448ec31f0af3fe761ebbe04ee4cbadff06

  • SSDEEP

    3072:h/YfCR8Mbcx0zPUeGMw70JXBRdTqltV4JKeK5n8Q3nT:hgflScx0zPC70J+VNeKn3nT

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • aa2e06be6aed2cf9a4445cc3a239fb87e069e5e693c555e1e2a651970f725af5
    .exe windows x64

    8db6cf2ede2b203104185a1388b19a7b


    Code Sign

    Headers

    Imports

    Exports

    Sections