Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_7eaa8c54ee678aa6c2c1a5a9987d5ef48ab7d72c9977b430a2bc7c5c98a438ea_2021-01-13__081210569348._doc.doc
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
emotet_e2_7eaa8c54ee678aa6c2c1a5a9987d5ef48ab7d72c9977b430a2bc7c5c98a438ea_2021-01-13__081210569348._doc
-
Size
156KB
-
MD5
d6050428f5c4eca9fc1f28ab5a775523
-
SHA1
6a37c920773d6e2d07daeff6316337ded47830ba
-
SHA256
7eaa8c54ee678aa6c2c1a5a9987d5ef48ab7d72c9977b430a2bc7c5c98a438ea
-
SHA512
82fd6903b652f8ed548a8a22af801bb63c9d9906550a8ae1caed3e7658f47240fa74a05407395c11be2cb3df2eba9adc24edec4c81c0a5dedbd8313938625e54
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_7eaa8c54ee678aa6c2c1a5a9987d5ef48ab7d72c9977b430a2bc7c5c98a438ea_2021-01-13__081210569348._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a