General

  • Target

    emotet_e2_ed1d3d3103290456664d1042c875c1faef705150c5c1cb9c49bcd418dbe22160_2021-01-13__030131141687._doc

  • Size

    156KB

  • MD5

    603bfb1047c4761ae274383f459b7a74

  • SHA1

    bc2ca4bbf7426bf7a284d14e0e1f611ab2ca18a8

  • SHA256

    ed1d3d3103290456664d1042c875c1faef705150c5c1cb9c49bcd418dbe22160

  • SHA512

    438a95cee5083ef25ca5b51e80da7906ed2a7c0160f378f19180969bb59748e4b005cc938533a6e838d9a7074cabd61934680f4a14efd6e6b67f22d5280b69f6

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

Files

  • emotet_e2_ed1d3d3103290456664d1042c875c1faef705150c5c1cb9c49bcd418dbe22160_2021-01-13__030131141687._doc
    .doc windows office2003

    Rw_gu6fr25wcs

    Rkhqpdwb_l8se

    Qsfjcxgtaymuqu25a