Analysis
-
max time kernel
87s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 16:45
Behavioral task
behavioral1
Sample
PaypalChecker/PaypalChecker.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
PaypalChecker/PaypalChecker.exe
-
Size
241KB
-
MD5
51b45616b6902c84fed4f09c0ae52fca
-
SHA1
39f490a578c996ec11601b203c600c7746cb9802
-
SHA256
4b7bc1185048cb51fde3554326846cf426d7e1d3aa372349adb8c6e921762ce6
-
SHA512
b7e6e95072e0b27bb2aad79e6f1ad6f17000bd724e752679ddaead7c50655e52a37b5b082db7c1173992873bc4c61ded852cd605b4b5620f176772be0d31df31
-
SSDEEP
6144:wloZM+rIkd8g+EtXHkv/iD4YMVIp3cw/9eHp0AV39b8e1mSfi5F:+oZtL+EP8YMVIp3cw/9eHp0AVNpKr
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/3056-1-0x0000000000020000-0x0000000000062000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3056 PaypalChecker.exe