Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_517e2cbde3c6477b3c5f844d987a09b94e880056661d2b5919444a00f6402fe9_2021-01-13__044200037414._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_517e2cbde3c6477b3c5f844d987a09b94e880056661d2b5919444a00f6402fe9_2021-01-13__044200037414._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_517e2cbde3c6477b3c5f844d987a09b94e880056661d2b5919444a00f6402fe9_2021-01-13__044200037414._doc
-
Size
157KB
-
MD5
d87175f25dba7eb5f9a8d62a0e71db71
-
SHA1
3e4c2af3a954cd816f0e66e737065931fb8d5c2f
-
SHA256
517e2cbde3c6477b3c5f844d987a09b94e880056661d2b5919444a00f6402fe9
-
SHA512
cc35362b8690ce3472724f6c2dbc0bdb2431705c4c5c25c543e759f63543d1f06c343a1ccb553d23b1fa8419a3491a16ed8145951e15d8b08ee40671c0ee4500
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_517e2cbde3c6477b3c5f844d987a09b94e880056661d2b5919444a00f6402fe9_2021-01-13__044200037414._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a