Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c_2020-08-01__021028._doc.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e2_c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c_2020-08-01__021028._doc
-
Size
171KB
-
MD5
a607b2c0888e58fd92225bc68770c332
-
SHA1
d16bd800b58a926db38c1bb13e9d27ca964ad1de
-
SHA256
c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c
-
SHA512
97861f8230c67ae9d66a4ff130e1417434c89fd98d66da30019b7bfa4957fbced269470a14defa27688a1e599ec372dc263cd2295172c4828d625a96b6c62bad
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c_2020-08-01__021028._doc.doc windows office2003