Overview
overview
10Static
static
82023-03-17...es.zip
windows10-1703-x64
101-attachm...33.zip
windows10-1703-x64
1A 2618033.doc
windows10-1703-x64
1001-attachm...08.one
windows10-1703-x64
101-attachm...08.zip
windows10-1703-x64
102-embedde...ut1.js
windows10-1703-x64
803-downloa...Fj.zip
windows10-1703-x64
103-downloa...jc.zip
windows10-1703-x64
103-downloa...cA.zip
windows10-1703-x64
103-downloa...vb.zip
windows10-1703-x64
1Behavioral task
behavioral1
Sample
2023-03-17-Emotet-malware-samples.zip
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
01-attachments-3-examples/A 2618033.zip
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
A 2618033.doc
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
01-attachments-3-examples/Message 167168370508.one
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
01-attachments-3-examples/Untitled_608.zip
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
02-embedded-JS-file-from-OneNote-doc/output1.js
Resource
win10-20230220-en
Behavioral task
behavioral7
Sample
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/6AfEa8G0W8NOtUh7hqFj.zip
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/Ac8wwulKxqZjc.zip
Resource
win10-20230220-en
Behavioral task
behavioral9
Sample
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/O1uPzXd2YscA.zip
Resource
win10-20230220-en
Behavioral task
behavioral10
Sample
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/TKK8yKdEvyYAbBE5avb.zip
Resource
win10-20230220-en
General
-
Target
2023-03-17-Emotet-malware-samples.zip
-
Size
4.8MB
-
MD5
8af138cf4f2e730d4e9249e0dc755c07
-
SHA1
054cfa0f33768206b2557b092a0e87ae0163a2db
-
SHA256
239ef6d53cade1d87bbe2407b8d78ce99e094147877da0de499322ab7dfc6b2b
-
SHA512
fc698c732d91f1987e4dfd82ff645a0b69f3aeb7786836ffdcbc948c00455a2cb90381bffaac516cc6afcbd31e3308dd4cd8ef4ef95c797cc6fe741f78598055
-
SSDEEP
98304:jCrQ+7L5ioBhKtOXGhFXDNE7+FxNGEtPAdZ9Km/WkzqbZh:20+7UoGOWhDi+zNGuYre5h
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/A 2618033.doc office_macro_on_action -
resource static1/unpack002/A 2618033.doc
Files
-
2023-03-17-Emotet-malware-samples.zip.zip
Password: infected
-
01-attachments-3-examples/A 2618033.zip.zip
-
A 2618033.doc.doc windows office2003
ThisDocument
Module1
-
01-attachments-3-examples/Message 167168370508.one.one
-
01-attachments-3-examples/Untitled_608.zip.zip
-
02-embedded-JS-file-from-OneNote-doc/output1.js.js
-
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/6AfEa8G0W8NOtUh7hqFj.zip.zip
-
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/Ac8wwulKxqZjc.zip.zip
-
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/O1uPzXd2YscA.zip.zip
-
03-downloaded-zips-with-inflated-Emote-DLLs-4-examples/TKK8yKdEvyYAbBE5avb.zip.zip