Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_e1b5563d7cab0b153d4f5c25faceaed78fe39f3310de6e84c4e111ef5a6bf3b1_2020-07-28__203724._doc.doc
Resource
win7
0 signatures
0 seconds
General
-
Target
emotet_e1_e1b5563d7cab0b153d4f5c25faceaed78fe39f3310de6e84c4e111ef5a6bf3b1_2020-07-28__203724._doc
-
Size
169KB
-
MD5
29f85758084aa382f8eba064fedbfe59
-
SHA1
fbbe4516fc7f1d7fbd427c6c289e0974cd037239
-
SHA256
e1b5563d7cab0b153d4f5c25faceaed78fe39f3310de6e84c4e111ef5a6bf3b1
-
SHA512
47ad58fe1527496381936527c0b909dd59d5c68023f02e985cb8e33a56fe17457d5a4c7bc3f7ceff3c533373b0b222b68760aa4cc076ab8825e2cabb46f326ac
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e1_e1b5563d7cab0b153d4f5c25faceaed78fe39f3310de6e84c4e111ef5a6bf3b1_2020-07-28__203724._doc.doc windows office2003