Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_5ccd841c99093d56cd8f101a9adeb6ece91ba19ff20022b0a6fbdd61f9d82f39_2020-07-31__141747._doc.doc
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e2_5ccd841c99093d56cd8f101a9adeb6ece91ba19ff20022b0a6fbdd61f9d82f39_2020-07-31__141747._doc
-
Size
175KB
-
MD5
1a586b8a618eb08a05f014e171f5143b
-
SHA1
16a76b52ebd5ff1376f4ced33a8df13a768d021c
-
SHA256
5ccd841c99093d56cd8f101a9adeb6ece91ba19ff20022b0a6fbdd61f9d82f39
-
SHA512
30619b06b329de268bdf7638f97324cbdbad7b484b8ab1a25c9b28b9e1bea5dbe3f356e149f56d24fa1f2907509bc0e370827c6166c96c79bb52bc4fef60dfc0
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_5ccd841c99093d56cd8f101a9adeb6ece91ba19ff20022b0a6fbdd61f9d82f39_2020-07-31__141747._doc.doc windows office2003