Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_a17adf48e5d1001ed87a1af31344545ee83df584126c6ade083cdec6fd158105_2020-09-19__110021344124._doc.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
emotet_e2_a17adf48e5d1001ed87a1af31344545ee83df584126c6ade083cdec6fd158105_2020-09-19__110021344124._doc
-
Size
190KB
-
MD5
20a7e39bcf88cff49e2a9b208ddd1243
-
SHA1
34d64c9c65204a425f5efa5a9b9ccb93341f5e5b
-
SHA256
a17adf48e5d1001ed87a1af31344545ee83df584126c6ade083cdec6fd158105
-
SHA512
cc75b42be394e07954fc4b3a4c031cbbb248a62d42ec8a3cd294f303bf8c80301d1f142f4617bec8938e9bd63ac7fb61ce0e6ae194f2c023230f9be1432bcd45
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_a17adf48e5d1001ed87a1af31344545ee83df584126c6ade083cdec6fd158105_2020-09-19__110021344124._doc.doc windows office2003
Z4m990hqcixol
E4nku28omvunpx