| N/A | |
| Zip archive data, at least v2.0 to extract | 103589 |
| N/A | |
| 024b63d7e5ec65a0ce09440248544d48 | |
| b2b7225d8949504097ca413c974ed92de2a6ea2f | |
| 42c9a5e588bba0bcae33a66cea04eb77daccfe290be864ae608aeabab5f47570 | |
| N/A | |
| N/A | |
| N/A | |
| N/A | |
| Deflated | |
| application/zip | |
| N/A | |
| 103283 | |
| 0xb20fbcd7 | |
| 139264 | |
| ZIP | |
| 101 kB | |
| Dhl_Status_4487360414313191__Id10__4765502375629582LXCHK____AQ__ORV__F11_06_2015___atdeDHL_FCR235115.exe | |
| 20 | |
| Source: |

| Ad-Aware | Trojan.GenericKD.2482977 |
| Avira | TR/Emotet.A.186 |
| BitDefender | Trojan.GenericKD.2482977 |
| Bkav | HW32.Packed.481D |
| ClamAV | Suspect.Bredozip-zippwd-2 |
| DrWeb | Trojan.Emotet.108 |
| ESET-NOD32 | Win32/Emotet.AD |
| GData | Archive.Malware.FakeInvoice.A@gen |
| Kaspersky | Backdoor.Win32.Androm.hfna |
| McAfee | Emotet-CJ!heur!024B63D7E5EC |
| MicroWorld-eScan | Trojan.GenericKD.2482977 |
| Panda | Trj/RansomCrypt.D |
| Qihoo-360 | Win32/Trojan.Multi.daf |
| Sophos | Troj/Invo-Zip |
| TrendMicro | TSPY_EMOTET.XXSJ |
| TrendMicro-HouseCall | TSPY_EMOTET.XXSJ |