Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_2d0a5eef7407bd0f934ef9ad2782e437c5cdb55e31e66384e6442d82cf7735c5_2020-07-29__014446._doc.doc
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e1_2d0a5eef7407bd0f934ef9ad2782e437c5cdb55e31e66384e6442d82cf7735c5_2020-07-29__014446._doc
-
Size
172KB
-
MD5
178a5f6daf5e23231856627d16dfcbff
-
SHA1
cfb6eeda8a907bb64b27a39692acc15e93560425
-
SHA256
2d0a5eef7407bd0f934ef9ad2782e437c5cdb55e31e66384e6442d82cf7735c5
-
SHA512
5c299c4ba5f27710a0dc7ad05d5010d8995ec9c0d0f2fe373772138068dfcce3cf32bbb4d40e4eaf30ff56495044ee05f5db7835ada6fb6a8908b2f79ad36da3
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e1_2d0a5eef7407bd0f934ef9ad2782e437c5cdb55e31e66384e6442d82cf7735c5_2020-07-29__014446._doc.doc windows office2003