Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_1b833b967a9b2dc29a4982addef8500c6480991a907be97fdccc799d21dd337b_2021-01-13__031502711354._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_1b833b967a9b2dc29a4982addef8500c6480991a907be97fdccc799d21dd337b_2021-01-13__031502711354._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_1b833b967a9b2dc29a4982addef8500c6480991a907be97fdccc799d21dd337b_2021-01-13__031502711354._doc
-
Size
157KB
-
MD5
246f1e725d831e084e3600be9ed11135
-
SHA1
a47a6df03a19f2d062caea2dbd12c640017d14fa
-
SHA256
1b833b967a9b2dc29a4982addef8500c6480991a907be97fdccc799d21dd337b
-
SHA512
8869ae8a7e3ab1f5d6581a5033bc967f3a31dcc769a177f870ac7e82fdc4d6908b2cae43dc9d5640034199b587feb8c493889393b599fa6751eab70f896d37a3
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_1b833b967a9b2dc29a4982addef8500c6480991a907be97fdccc799d21dd337b_2021-01-13__031502711354._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a