General

  • Target

    bd7763a358d2298acc15ec1ff83e11503e4e6795aec508a0e66365b436ae24c0

  • Size

    192KB

  • MD5

    ffbe2fdbbbf374ef0873925d707db1a7

  • SHA1

    adc6ca45d1040971b6e0c5dfbf045ce6ab118e47

  • SHA256

    bd7763a358d2298acc15ec1ff83e11503e4e6795aec508a0e66365b436ae24c0

  • SHA512

    46339f292c317862a03e6001dd0b00110018815a753c32da57d9625921ef42584d98d5c4f6ce13a7cd16239ae3a8c7193a8a9a123b37c3a17132d32c91319d7f

  • SSDEEP

    3072:k1octnOm2ITDV+Pub1B9jJqst+L6RgGDvktwh/JarXujPF:k1XNOm2ITyub1BqI+YMsorej

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • bd7763a358d2298acc15ec1ff83e11503e4e6795aec508a0e66365b436ae24c0
    .dll windows x64


    Code Sign

    Headers

    Sections