Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_4f8d2a942c244360b6b8c311d59352dad83f77899cc7d4094efd99c2e324af8f_2020-07-31__180143._doc.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e2_4f8d2a942c244360b6b8c311d59352dad83f77899cc7d4094efd99c2e324af8f_2020-07-31__180143._doc
-
Size
174KB
-
MD5
1c071ac6007f6a9aef3d67dae012560e
-
SHA1
4501563b8ff8eea90e2829e1a93bafe85e4996cd
-
SHA256
4f8d2a942c244360b6b8c311d59352dad83f77899cc7d4094efd99c2e324af8f
-
SHA512
94376476818108fc1b21c8ebba96ee679e9af10e242cf316e9845ca0d4ce7c0a1e52899c088995709ff9b0c4eb350c2575899d455ff4263000a21833ee68d223
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_4f8d2a942c244360b6b8c311d59352dad83f77899cc7d4094efd99c2e324af8f_2020-07-31__180143._doc.doc windows office2003