Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_d99a1916b1d097d5768cd11a74be70e02974b1de04cd2e5e8585b1a7837cf68a_2020-07-31__194800._doc.doc
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e1_d99a1916b1d097d5768cd11a74be70e02974b1de04cd2e5e8585b1a7837cf68a_2020-07-31__194800._doc
-
Size
169KB
-
MD5
e8a6a9ae4f872aa76127a5c0cf615c51
-
SHA1
637756394c724655f8a9be26db62986f65f65db3
-
SHA256
d99a1916b1d097d5768cd11a74be70e02974b1de04cd2e5e8585b1a7837cf68a
-
SHA512
ee1069ee51962f896b5824a86fc346ceca7aaa472759b397f0f4f4eaa8dd899c50938177753c08b07ced85cabd7812ad47b32f9781571244db6328f7f7ee5bdd
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e1_d99a1916b1d097d5768cd11a74be70e02974b1de04cd2e5e8585b1a7837cf68a_2020-07-31__194800._doc.doc windows office2003