Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc
-
Size
172KB
-
MD5
2e5604fc710cb5f7d0802eed16d9974b
-
SHA1
1d3b14e0647a32071714a9c318e7ba88fcac9b36
-
SHA256
7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9
-
SHA512
58104d7c98bd3dcaf7d32b8ab75c3051ba1ce631f38e84ad5dba74319d364d88f9d9efafb54508ea7dbf9812af4dce2a5dc2ab61f74dd2b6d04a7e5d8df7056e
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc.doc windows office2003