General

  • Target

    c489a2b966c615504a618c46ab8dbbe94d5f11cec2219113c2d0b62e4bb497d2

  • Size

    305KB

  • MD5

    a3c8febccc2edd615ff98e78b8ebf6c2

  • SHA1

    071f15d61322c0480bb71690ed114f3736f7844c

  • SHA256

    c489a2b966c615504a618c46ab8dbbe94d5f11cec2219113c2d0b62e4bb497d2

  • SHA512

    6c15e95112868969184d511f5cc35bddd868e8e2a4c61b4c12bff45383e62a0a90fe1fde4bd56fa0dca1523ebf90c05e8a5e08966d3b6f85517156fd5d38d28b

  • SSDEEP

    6144:1TAstnaza+n4KNLJ5kqJnzW+2yNmBdD1fbjSVhqAiFePD:JA0naz9n4K75nxz6yNmBdD1zuVvOeP

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • c489a2b966c615504a618c46ab8dbbe94d5f11cec2219113c2d0b62e4bb497d2
    .dll windows x86

    bda6cb91b2b34a23afb9a091770d342d


    Headers

    Imports

    Exports

    Sections