| N/A | |
| Zip archive data, at least v2.0 to extract | 74026 |
| N/A | |
| 29142edb6615c8931be52a325c56b298 | |
| 4528dc0f5d534aa01bc5fa6cff6d44ea28532e14 | |
| 24b977da176fbcb9bf1e3615462593d960ae10fac0907247fdd20f0c7bf2fb12 | |
| N/A | |
| N/A | |
| N/A | |
| N/A | |
| Deflated | |
| application/zip | |
| N/A | |
| 73720 | |
| 0xc6c964e9 | |
| 243641 | |
| ZIP | |
| 72 kB | |
| Dhl_Status_7594097802703912__Id10__5665126782806197GXCZH____GZ__WRC__F11_06_2015___atdeDHL_LKO235115.exe | |
| 20 | |
| Source: |

| ClamAV | Suspect.Bredozip-zippwd-2 |
| ESET-NOD32 | Win32/Emotet.AD |
| GData | Archive.Malware.FakeInvoice.A@gen |
| McAfee | Emotet-FGNI!4149846D0C5A |
| McAfee-GW-Edition | Artemis |
| Panda | Trj/Genetic.gen |
| Qihoo-360 | Win32/Trojan.Multi.daf |
| Sophos | Troj/Invo-Zip |
| Symantec | W32.Cridex.B |
| TrendMicro | TSPY_EMOTET.XXSI |
| TrendMicro-HouseCall | TSPY_EMOTET.XXSI |