General

  • Target

    fa4f6b5212168af58a40adbb2bd8df08f55bfb2f76d8f7858105457e7384276c

  • Size

    136KB

  • MD5

    0079a697b8acbb0aa35f9f662f38debe

  • SHA1

    e2b64333e4d4d9bf3eed1a7b5bf701eb6e4ad77e

  • SHA256

    fa4f6b5212168af58a40adbb2bd8df08f55bfb2f76d8f7858105457e7384276c

  • SHA512

    5eb2a2045d0215f0f4c15505638b046e84db1a497e0c77e022938945b5f20ef238a50084b1ebcbe02c2425f7d8983650269f2729c6b5d41de12875539764c4f2

  • SSDEEP

    3072:X8zDSsUCXfZW+vrUrUqQwY7rmqQMMkg9gWprFa:mDSsjU+vvqQ/bw6srF

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • fa4f6b5212168af58a40adbb2bd8df08f55bfb2f76d8f7858105457e7384276c
    .dll windows x86

    3c93940751e685cd5c2ca1df975e8c65


    Code Sign

    Headers

    Imports

    Exports

    Sections