Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_1f19f1cc91f28959e4f1a099b4f6d11a2dfd3b5d5ecf73f596b764dfdc356b57_2020-07-29__000613._doc.doc
Resource
win7
0 signatures
0 seconds
General
-
Target
emotet_e2_1f19f1cc91f28959e4f1a099b4f6d11a2dfd3b5d5ecf73f596b764dfdc356b57_2020-07-29__000613._doc
-
Size
175KB
-
MD5
fb1cbe7a44e5ec306b7417536dd53823
-
SHA1
dd2e4fee429893be634cff2f605f725e82d2dc10
-
SHA256
1f19f1cc91f28959e4f1a099b4f6d11a2dfd3b5d5ecf73f596b764dfdc356b57
-
SHA512
99c8df8339e9235f4dfda7c828f0d0c0211a4816647bb6338fcbe04ceb99f849006a5c9c61caaf430934c64b74ca4a45950de52dd4f0c2b9fb2fbd1dbaa9e557
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_1f19f1cc91f28959e4f1a099b4f6d11a2dfd3b5d5ecf73f596b764dfdc356b57_2020-07-29__000613._doc.doc windows office2003