Static task
static1
Behavioral task
behavioral1
Sample
7806c5adbd597c7c21ae08f3ca6c65a98df2ae314f033ad57ae8708c930a4af2.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
7806c5adbd597c7c21ae08f3ca6c65a98df2ae314f033ad57ae8708c930a4af2
-
Size
214KB
-
MD5
6c904f4bb401ce90aae608a9521dd666
-
SHA1
9c24ffc3beae490a769fc990910b8f136ad3cd67
-
SHA256
7806c5adbd597c7c21ae08f3ca6c65a98df2ae314f033ad57ae8708c930a4af2
-
SHA512
eb9fc44a3f04c11fec7e5c2a790f481ba9cf590c64c935bbe2047b24b1f61fda0a7cf011562d0b610b426f586b8825a4cc5c06661a61decde16c60dc3a319a94
Score
9/10
Malware Config
Signatures
-
Templ.dll packer 1 IoCs
Detects Templ.dll packer which usually loads Trickbot.
Processes:
resource yara_rule sample templ_dll
Files
-
7806c5adbd597c7c21ae08f3ca6c65a98df2ae314f033ad57ae8708c930a4af2.dll windows x86