Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_d22d7440cc55189d7d805520a53cedb9041f18b97d3a1bfb652a611fc4fb0ca9_2021-01-13__023100109024._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_d22d7440cc55189d7d805520a53cedb9041f18b97d3a1bfb652a611fc4fb0ca9_2021-01-13__023100109024._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_d22d7440cc55189d7d805520a53cedb9041f18b97d3a1bfb652a611fc4fb0ca9_2021-01-13__023100109024._doc
-
Size
157KB
-
MD5
a300d77e6b8243d0e226ee2fddc867f6
-
SHA1
4f56f328a9090f27f975007c01f3111593103db9
-
SHA256
d22d7440cc55189d7d805520a53cedb9041f18b97d3a1bfb652a611fc4fb0ca9
-
SHA512
79c46474add4eb9e9998e15719880855b931979cc3b0d2cfec3a36bc6e0c7b9d85aeb4f9397051ffd613511b47e1c8f9476b8bc4a3d62c6a2a76217e0027a235
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_d22d7440cc55189d7d805520a53cedb9041f18b97d3a1bfb652a611fc4fb0ca9_2021-01-13__023100109024._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a