Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx.doc
Resource
win7
Behavioral task
behavioral2
Sample
emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx.doc
Resource
win10
General
-
Target
emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx
-
Size
241KB
-
MD5
270f03e3d9fef36f88e51dd5dfec47c1
-
SHA1
79874b79923b7ea19a4d5caa9c8512767e9a4285
-
SHA256
cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995
-
SHA512
53c2fac1ef4b5f70eb0a77ff0359e226fabd533e2828b97f90ab4aa1f8a35572fffb7be07efb3775abf9df7ad67539890912429b7a75b901a711264b28ef90d4
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx.doc windows office2003