Task Information
| Task ID: | c35e74e2-8803-11ed-9ee1-42010aa4000b |
| File name: | 2f80000.exe |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | Emotet
|
| Author: | kevoreilly |
| Description: | Emotet Payload |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | MAL_Emotet_Jan20_1
|
| Author: | Florian Roth |
| Description: | Detects Emotet malware |
| Reference: | https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | MAL_Emotet_Jan20_1_RID2D22
|
| Author: | Florian Roth |
| Description: | Detects Emotet malware |
| Reference: | https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/ |
| TLP: | TLP:WHITE |
| Rule name: | classified |
| Author: | classified |
| TLP : | TLP:AMBER |
| Rule name: | win_emotet_auto
|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.emotet. |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | Win32_Trojan_Emotet
|
| Author: | ReversingLabs |
| Description: | Yara rule that detects Emotet trojan. |
| TLP: | TLP:WHITE |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter