General

  • Target

    197fdf98c5bc6258c8d83a21082d7ce7c3ebd1267eb1cd703741859cbf1edf7e

  • Size

    135KB

  • MD5

    fa6898e141275b99a23c72e51b2dddb5

  • SHA1

    767bcf82744ee6b4005edd7b06f5eccfb4b2f0c6

  • SHA256

    197fdf98c5bc6258c8d83a21082d7ce7c3ebd1267eb1cd703741859cbf1edf7e

  • SHA512

    b632f33f7534e4a1f7d2f35608719fa417174d75d3d1915b964837f2157b9198e01c68909f1760bbcad534a477dbc3f6b311d27a6012549fb76a16e47cb5453e

  • SSDEEP

    3072:u1/RwraemiLIm7koH08WFJB1w7S1vgkutrv:e/bJiLIPoUXJpJvut

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 197fdf98c5bc6258c8d83a21082d7ce7c3ebd1267eb1cd703741859cbf1edf7e
    .dll windows x86

    c8f9c880fd1a2b819edd0e5bca929f29


    Code Sign

    Headers

    Imports

    Exports

    Sections