Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_df2dc0151e9893df9a0b5fc037b8857125e0e013db773886f7714baaac50f250_2020-08-01__011842._doc.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e1_df2dc0151e9893df9a0b5fc037b8857125e0e013db773886f7714baaac50f250_2020-08-01__011842._doc
-
Size
169KB
-
MD5
437fa0f58d1ff3cdc7f15403eca13590
-
SHA1
e8775b89d0ce1d7247ae7756bb3d1b1e06a5a088
-
SHA256
df2dc0151e9893df9a0b5fc037b8857125e0e013db773886f7714baaac50f250
-
SHA512
cc8a6fb1f881ce7f94fdd17125ece435c89f598b2613e23078ed6466c4f26df396cda8250c84153167c8a10272f41be01be436d43158ad57fa956e9a18937835
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e1_df2dc0151e9893df9a0b5fc037b8857125e0e013db773886f7714baaac50f250_2020-08-01__011842._doc.doc windows office2003