Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_f4cacca3653da98959d2b7e7df30a2021d7c5844c01be3fb5c657235aabab8a7_2020-07-28__190053._doc.doc
Resource
win7v200722
Behavioral task
behavioral2
Sample
emotet_e1_f4cacca3653da98959d2b7e7df30a2021d7c5844c01be3fb5c657235aabab8a7_2020-07-28__190053._doc.doc
Resource
win10
General
-
Target
emotet_e1_f4cacca3653da98959d2b7e7df30a2021d7c5844c01be3fb5c657235aabab8a7_2020-07-28__190053._doc
-
Size
168KB
-
MD5
c6c0c47b44f4ac3296e7b09b450cf2ca
-
SHA1
089d3cd30dfe2e190f3f86a7a2fc5df215cb22f3
-
SHA256
f4cacca3653da98959d2b7e7df30a2021d7c5844c01be3fb5c657235aabab8a7
-
SHA512
27afe6f36285b9985ffc7801c17bdb02b7b14f63e276dfbba0108a1364aedc0bc2040262daa5c2f24cc519af27802e6450842a494251e39311b688b7b61c0c73
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e1_f4cacca3653da98959d2b7e7df30a2021d7c5844c01be3fb5c657235aabab8a7_2020-07-28__190053._doc.doc windows office2003