General

  • Target

    d4233c54349843bb93bc327e2fe68ce1670b4ff55380b2c1bf515d57401bfaaf

  • Size

    166KB

  • MD5

    8c72587dfa4962eb94425c8040e6fbed

  • SHA1

    c6fb2435b46ba9b69ff3dab9ff2c66754a995f90

  • SHA256

    d4233c54349843bb93bc327e2fe68ce1670b4ff55380b2c1bf515d57401bfaaf

  • SHA512

    3984639a7048255f79015c8db4295747549e6716fd41c40616db74aed0efb2328eefc685c7496b7de63164a8a1bf0d19cec5a7e8969970e1fc7bf04072ffff2b

  • SSDEEP

    3072:MFonHcH+W+2yNmBdDnbYMfbjSV2o8uPyqJDRYFEV5KouuvqiAziYM:xnzW+2yNmBdD1fbjSVhqAiFePD

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • d4233c54349843bb93bc327e2fe68ce1670b4ff55380b2c1bf515d57401bfaaf
    .dll windows x64

    e4e3740f5c4c740913be9784c3eef880


    Headers

    Imports

    Exports

    Sections