Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_1482d4727689bb4aedeeb0dc3658dd0ec67d73c6fc1e66bc1ab074bc4b6dd739_2021-01-13__044843002447._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_1482d4727689bb4aedeeb0dc3658dd0ec67d73c6fc1e66bc1ab074bc4b6dd739_2021-01-13__044843002447._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_1482d4727689bb4aedeeb0dc3658dd0ec67d73c6fc1e66bc1ab074bc4b6dd739_2021-01-13__044843002447._doc
-
Size
157KB
-
MD5
67aafc5857276c77bcdeaf3ed9dd46c6
-
SHA1
a7e132b8ee1ccfa65b61c8c9444483a296e7ec91
-
SHA256
1482d4727689bb4aedeeb0dc3658dd0ec67d73c6fc1e66bc1ab074bc4b6dd739
-
SHA512
e82c62109dfca6ac7068fb870aaedafbab155b2971d871dc7790f854ad24ab8b52e540ad8610be20bcdc658afb6fa5adfb4e78f54794fa4bb0bba0ee4e3c7780
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_1482d4727689bb4aedeeb0dc3658dd0ec67d73c6fc1e66bc1ab074bc4b6dd739_2021-01-13__044843002447._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a