Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_a6dc0ded7d05e28b3d600051b7e81134a117c5314d07e3cbc5284ef742af4aee_2021-01-13__064111716942._doc.doc
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
emotet_e2_a6dc0ded7d05e28b3d600051b7e81134a117c5314d07e3cbc5284ef742af4aee_2021-01-13__064111716942._doc
-
Size
157KB
-
MD5
f6319402782a829b454b41b0dfe6310d
-
SHA1
dec8550d405e041174e86a72b615e84e56a325cd
-
SHA256
a6dc0ded7d05e28b3d600051b7e81134a117c5314d07e3cbc5284ef742af4aee
-
SHA512
787f0596497afe25758367d4ebcbcc0c16ce7cce2d5d9951737211bcde17ea6abba21a2209e573f726b9b64dfe7ee9f775d648379ac2e78ce738d638c5c48ddb
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_a6dc0ded7d05e28b3d600051b7e81134a117c5314d07e3cbc5284ef742af4aee_2021-01-13__064111716942._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a