General

  • Target

    3cb2d07f61fad85620e2a95cd3270485217dcfd12d24639aa2ec52cfdd582576

  • Size

    136KB

  • MD5

    15deecda6809c98503e7936ee9ae61d6

  • SHA1

    30b0ae7df7747ba7fe3a558f0b879effdfa9a15a

  • SHA256

    3cb2d07f61fad85620e2a95cd3270485217dcfd12d24639aa2ec52cfdd582576

  • SHA512

    b20bfbf58b26cd72c3e4e5a66b2d85926ea002558dac341d83e4e7f5f6f4396b2e115f49fe0b8e39fd1b0f8a18fc93151fffcec4902bd4d0d582b2f6400b648a

  • SSDEEP

    3072:KMADETJ+JsiFW2d+mwHtp+qEbNxqmqQ8Meah3Mkyb:BAwTJ+Js7G+jtp+qELesGky

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 3cb2d07f61fad85620e2a95cd3270485217dcfd12d24639aa2ec52cfdd582576
    .dll windows x86

    6d6b81578a7584b1aaa86d73b5cabb12


    Code Sign

    Headers

    Imports

    Exports

    Sections