General

  • Target

    abef2e3528eb56a65246d6b49917f6b5f013b2813b091aa58ad7ebee21756615

  • Size

    380KB

  • MD5

    ba3faf36ed2e70ef1762c268ad6438ba

  • SHA1

    fcda0d2fe7d1f56295689a10cda77ffd8f3950ed

  • SHA256

    abef2e3528eb56a65246d6b49917f6b5f013b2813b091aa58ad7ebee21756615

  • SHA512

    4c96f10940441c7af121878f07131c677125436994e0417191bc23a519948f09cde362a17c3417e215c4aa274f0bfe1b0b72e6139af7fa3f644a5915e1ff00a3

  • SSDEEP

    3072:s/YfCR8cbcx0zQUeGMw70JXiRdTqltV4JNyK5n8QnT:sgflCcx0zQC70A+VayKHnT

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • abef2e3528eb56a65246d6b49917f6b5f013b2813b091aa58ad7ebee21756615
    .exe windows x64


    Code Sign

    Headers

    Sections