General

  • Target

    c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8

  • Size

    340KB

  • MD5

    6ef7c427280a283ebbd0736d0caafb1b

  • SHA1

    f9fa49f868caf4da1b4a2e2a67d402b893bfa372

  • SHA256

    c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8

  • SHA512

    7d934e9878e270699895dfbea65dfdc95c93c1ab0c87ed805210430bf74266600a709e9e1b06b16ab409c7f1c7b3befb77a7b829e2c54df4f55d5a7396b1f6c9

  • SSDEEP

    6144:AdLIP63SG00/rp3GAO3griAqM3H2IKon/sNJJC+mT+e9o+dIoh/R56:AdLIS3SE/7O3nM32IRn8JNkSoJ

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8
    .dll windows x64

    6c75d093aab14bc473d82b7e143dfd46


    Code Sign

    Headers

    Imports

    Exports

    Sections