Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_7c0d398298f8a56ad9ec3dcd76f6d3d3ec37d0235722697cf910b162f5c46ed2_2020-07-29__000603._doc.doc
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e2_7c0d398298f8a56ad9ec3dcd76f6d3d3ec37d0235722697cf910b162f5c46ed2_2020-07-29__000603._doc
-
Size
175KB
-
MD5
382dd489dddcafec116d2bd839b383a7
-
SHA1
c6035d1c8f9685101d1b256c0d13312b469f0818
-
SHA256
7c0d398298f8a56ad9ec3dcd76f6d3d3ec37d0235722697cf910b162f5c46ed2
-
SHA512
cc953fb161be46a8445aee52c3ac6a2083e8ebfc322a582dbde59bc910a353221e61e2d16cc0b7a5e237dd0dd0e46946a2cc8724654a1b0a925b76cc3b9be86e
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_7c0d398298f8a56ad9ec3dcd76f6d3d3ec37d0235722697cf910b162f5c46ed2_2020-07-29__000603._doc.doc windows office2003