Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e_2021-01-13__053402888743._doc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_e2_4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e_2021-01-13__053402888743._doc.doc
Resource
win10v20201028
General
-
Target
emotet_e2_4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e_2021-01-13__053402888743._doc
-
Size
157KB
-
MD5
02f8e100bee5f02fd05ef8e781e3ca54
-
SHA1
3b2d016d9f69230e509f6cb782d946edac9b5275
-
SHA256
4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e
-
SHA512
6c0a778e885450f3fe125bc4f0205256b7d4b1f759c3b73f75a0210eadf517b14221cc876bdec3caa1868df2a3ede7ea8f819a4d1f819b27f023b2282e821fb7
Malware Config
Signatures
-
Processes:
resource yara_rule sample office_xlm_macros
Files
-
emotet_e2_4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e_2021-01-13__053402888743._doc.doc windows office2003
Rw_gu6fr25wcs
Rkhqpdwb_l8se
Qsfjcxgtaymuqu25a