Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_453600dee42ab3b26d03bec3c38a25ee588f09836a35656a89942f3b6f9c53b6_2020-07-29__000605._doc.doc
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e2_453600dee42ab3b26d03bec3c38a25ee588f09836a35656a89942f3b6f9c53b6_2020-07-29__000605._doc
-
Size
174KB
-
MD5
86aee990566c0fd52f15c55068e5acf2
-
SHA1
f88b64dddebe50ebb9a3fa5f5d64f6b94398c4eb
-
SHA256
453600dee42ab3b26d03bec3c38a25ee588f09836a35656a89942f3b6f9c53b6
-
SHA512
27cc2793528bf9c93ff9ec2cf9c17b197f793137e4faca98760077cd6ab6fd607bf78d01f45e6fcf33ae90be44a37e50fc527248d6c1dc257311293ae056df32
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_453600dee42ab3b26d03bec3c38a25ee588f09836a35656a89942f3b6f9c53b6_2020-07-29__000605._doc.doc windows office2003