Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_3045a0410a648c72c32b3518de76c2515c2a25a83b49c50dd0f76b684e256cfc_2021-01-13__053737032456._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_3045a0410a648c72c32b3518de76c2515c2a25a83b49c50dd0f76b684e256cfc_2021-01-13__053737032456._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_3045a0410a648c72c32b3518de76c2515c2a25a83b49c50dd0f76b684e256cfc_2021-01-13__053737032456._doc
-
Size
156KB
-
MD5
8a27aa8fde8ffd61934113f5252cf437
-
SHA1
9e92fd2727622e65d147dc844001e88ee0a64040
-
SHA256
3045a0410a648c72c32b3518de76c2515c2a25a83b49c50dd0f76b684e256cfc
-
SHA512
d556efc56f27c738426503eb45aa33bf7cea254ac4d285c78e1ee28dc7adaf2697880e5864603d0be6bd60ee32bdc186b2ef0a5626b0bec7b5c031860d080cda
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_3045a0410a648c72c32b3518de76c2515c2a25a83b49c50dd0f76b684e256cfc_2021-01-13__053737032456._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a