Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_feea2193fa8429572e0d346487c4e58bffd2c6cfc320d05054411a8df5c3e0d3_2020-07-29__000932._doc.doc
Resource
win7
0 signatures
0 seconds
General
-
Target
emotet_e2_feea2193fa8429572e0d346487c4e58bffd2c6cfc320d05054411a8df5c3e0d3_2020-07-29__000932._doc
-
Size
175KB
-
MD5
8eab9cbc34bbb785f5ec8b0cd0ba61ba
-
SHA1
09b7f4c5e7aa3b29b2c67a6dc60ef2eb3534cc2d
-
SHA256
feea2193fa8429572e0d346487c4e58bffd2c6cfc320d05054411a8df5c3e0d3
-
SHA512
148ec8ae93cb345ac8bb9dcc9af9eebf618dabbeb523ea3b59af2736bc3742156c7887fd6608d5ddb73e71cb4e4b06d968c3357a5f4a5294409cff6da7c10ec9
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_feea2193fa8429572e0d346487c4e58bffd2c6cfc320d05054411a8df5c3e0d3_2020-07-29__000932._doc.doc windows office2003