Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415_2021-01-12__221037616212._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415_2021-01-12__221037616212._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415_2021-01-12__221037616212._doc
-
Size
158KB
-
MD5
945712b74958b4dbc0adccf48ee59080
-
SHA1
af8dc5ec442108c219c384909b1956a4c8f3ce60
-
SHA256
c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415
-
SHA512
757edf6aefc5aace7cb1d61cf606d878ba99a9e7030a6eda472fe997d2c7755711d9179395564ab2fa73848eb0b3b8f5d609fb1b85d24e4c96e18824c05f025d
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415_2021-01-12__221037616212._doc.doc windows office2003
Kyl0l3rqw280c6ssa
P0_myy5fnenf
Gx8fznt8p0b