Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_8add0bb0118c43903e19b209639a22041bb08f833c47625a62be533c7eab7151_2021-01-13__042840400656._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_8add0bb0118c43903e19b209639a22041bb08f833c47625a62be533c7eab7151_2021-01-13__042840400656._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_8add0bb0118c43903e19b209639a22041bb08f833c47625a62be533c7eab7151_2021-01-13__042840400656._doc
-
Size
158KB
-
MD5
30fb11d1c83c43c29137f0d0e2192d2e
-
SHA1
d01488b558f72658bd41d8b0352fabf97021bd03
-
SHA256
8add0bb0118c43903e19b209639a22041bb08f833c47625a62be533c7eab7151
-
SHA512
084897a749481831376e02087a40fd548f7d9630cafe6d37327d30c68653d1c2a5d40c9b76930c003d4539dd42f8a5db98274b5ff9da2e635620c73f6bc5854a
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_8add0bb0118c43903e19b209639a22041bb08f833c47625a62be533c7eab7151_2021-01-13__042840400656._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a