General
-
Target
emotet_list_ioc_cronupTue_Jan_25_115429_PM_CST_2022.malw
-
Size
70KB
-
Sample
220126-gvw34shfbl
-
MD5
74ef2589b372f105b31d69b352aec951
-
SHA1
2f12a5d662ee51bf73e7ddc2e04c7c018f367e36
-
SHA256
561f1541d1ce60dd8a10c61c54f99d83e67ed86b0f645a6e564a99baa08f56b3
-
SHA512
a5b2124f45034be6c2450a0623439fddf8251f431057ab004da9601f07f814ff6a5db6dbd74f09486ee5ed129a7c514effb999db0181161acaee856f529c7c4b
Behavioral task
behavioral1
Sample
emotet_list_ioc_cronupTue_Jan_25_115429_PM_CST_2022.xls
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
emotet_list_ioc_cronupTue_Jan_25_115429_PM_CST_2022.xls
Resource
win10-en-20211208
Malware Config
Extracted
http://0xb907d607/fer/fe2.html
Targets
-
-
Target
emotet_list_ioc_cronupTue_Jan_25_115429_PM_CST_2022.malw
-
Size
70KB
-
MD5
74ef2589b372f105b31d69b352aec951
-
SHA1
2f12a5d662ee51bf73e7ddc2e04c7c018f367e36
-
SHA256
561f1541d1ce60dd8a10c61c54f99d83e67ed86b0f645a6e564a99baa08f56b3
-
SHA512
a5b2124f45034be6c2450a0623439fddf8251f431057ab004da9601f07f814ff6a5db6dbd74f09486ee5ed129a7c514effb999db0181161acaee856f529c7c4b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-