General

  • Target

    5f49b4e7f7eb260f41776f02600f71acd1283659f3974c62af92ecdba8289d1d

  • Size

    134KB

  • MD5

    29465a900924318d4707117e41287ff0

  • SHA1

    9a577e5e5380b40f7d9b4a6fe5a0d8c9e400659e

  • SHA256

    5f49b4e7f7eb260f41776f02600f71acd1283659f3974c62af92ecdba8289d1d

  • SHA512

    19cef069614a1271b6ceebbbb435d6c746c2da32bd8caf014dcd8b3bab4af207640bac5ab2440f8dada28de45cd643e7c84b1e0c4e37df9ae407c3443e733426

  • SSDEEP

    3072:S4HT2KGyTTMahyeWvRWZzfAQrJB18MShMEihNa0zwrES:ZT2KGF2JKWZLXJ2yzrS

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 5f49b4e7f7eb260f41776f02600f71acd1283659f3974c62af92ecdba8289d1d
    .dll windows x86

    6eeec7d0387ea7b2e7cc27a9c97cc0b8


    Code Sign

    Headers

    Imports

    Exports

    Sections