Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_3cd3aa331f8aef2b887f21b1a1626071d01eb2511af04f42fa49ce8068b1b16f_2020-07-29__031547._doc.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e1_3cd3aa331f8aef2b887f21b1a1626071d01eb2511af04f42fa49ce8068b1b16f_2020-07-29__031547._doc
-
Size
172KB
-
MD5
2d5dc2bbc2193e3fa2b2af3b94948068
-
SHA1
2d87090a588ed2d5acbc125f30089d859503a968
-
SHA256
3cd3aa331f8aef2b887f21b1a1626071d01eb2511af04f42fa49ce8068b1b16f
-
SHA512
5ee523831599b5d03d2834a2a02a943d600e229eb4b113039e04d18949aed599d3aa88a8a90f2579591f465959db5c2ef80b88b936945c69717e1e1e2c736b07
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e1_3cd3aa331f8aef2b887f21b1a1626071d01eb2511af04f42fa49ce8068b1b16f_2020-07-29__031547._doc.doc windows office2003