General

  • Target

    af3c91fd79086852fefecf5a0e5a2899399220c2480e1759ac7c94b50eaa1f8a

  • Size

    164KB

  • MD5

    f0b18f99eff5ed504f843959d436d44f

  • SHA1

    d6d96bf838a9416227644c18713f87b5b998ebc5

  • SHA256

    af3c91fd79086852fefecf5a0e5a2899399220c2480e1759ac7c94b50eaa1f8a

  • SHA512

    b9ce721473c5eddc37a6d6f5b17af93b745a2a4ad9f4ea267d1e795d44ba4ffb018660ecd375ca99907c1f15ff84e2e39668500edc1fd321e6d7d5e1ba47e66e

  • SSDEEP

    3072:hCUO4MPdVuOokZWgNkdL5UP11/hbJJUozQ+6l5rES:kUO4sVZok5NkB211/RElOS

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • af3c91fd79086852fefecf5a0e5a2899399220c2480e1759ac7c94b50eaa1f8a
    .dll windows x86


    Code Sign

    Headers

    Sections