General
-
Target
2024-06-11_a62a27859c134979a69e87cc0a27d14f_mafia
-
Size
527KB
-
Sample
240611-jspmcszfrp
-
MD5
a62a27859c134979a69e87cc0a27d14f
-
SHA1
8862e802c4105036bdcf88855fa701d865dd2b68
-
SHA256
df749b13dcfb7caa1d09738207d08dbef5505fbd8a6834802244ba67e1479db5
-
SHA512
ddba5b945b66459e48bb3f8c66ecc9c149499b75b5aeffcbbcf35ac19e763f9ebb7cf235e01ca071130178e3b947ec93af5b4450b529e01f68b96fa4016dacce
-
SSDEEP
6144:yorf3lPvovsgZnqG2C7mOTeiLRDYTBzy9BXc6FTDaVImDH+Q+rrYvb+LIgMr5aBv:fU5rCOTeidim9W0PcI5AOMr5aGDZu
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_a62a27859c134979a69e87cc0a27d14f_mafia.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2024-06-11_a62a27859c134979a69e87cc0a27d14f_mafia
-
Size
527KB
-
MD5
a62a27859c134979a69e87cc0a27d14f
-
SHA1
8862e802c4105036bdcf88855fa701d865dd2b68
-
SHA256
df749b13dcfb7caa1d09738207d08dbef5505fbd8a6834802244ba67e1479db5
-
SHA512
ddba5b945b66459e48bb3f8c66ecc9c149499b75b5aeffcbbcf35ac19e763f9ebb7cf235e01ca071130178e3b947ec93af5b4450b529e01f68b96fa4016dacce
-
SSDEEP
6144:yorf3lPvovsgZnqG2C7mOTeiLRDYTBzy9BXc6FTDaVImDH+Q+rrYvb+LIgMr5aBv:fU5rCOTeidim9W0PcI5AOMr5aGDZu
-
Detected AnchorDNS Backdoor
Sample triggered yara rules associated with the AnchorDNS malware family.
-
Executes dropped EXE
-
Loads dropped DLL
-