General

  • Target

    b1e703bd4df1d3e85ff97b638357b8c96360c9a658930473d37b733dbed51e02

  • Size

    138KB

  • MD5

    fb82ccc8e504fe065fb785e4cfdd440a

  • SHA1

    14e9d68bba7a184863667c680a8d5a757149aa36

  • SHA256

    b1e703bd4df1d3e85ff97b638357b8c96360c9a658930473d37b733dbed51e02

  • SHA512

    d1e50c1bf8cc9e95d55c99085e93dc51655cd4a9f940115f13ddd0c19b9be8e088353adadd261673a33969e7d9b1632376d6106fdaf1f0d2067fad0f8bdf517c

  • SSDEEP

    3072:/kRZ/2G2n5ODJT/pmw2/vgTOqYU7mqQMMLs9+Vt0gqW8Qkb:Mj/2G8eV/pW/vgTOGLfMqZQ

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • b1e703bd4df1d3e85ff97b638357b8c96360c9a658930473d37b733dbed51e02
    .dll windows x86

    3c93940751e685cd5c2ca1df975e8c65


    Code Sign

    Headers

    Imports

    Exports

    Sections