General
-
Target
dmbral.exe
-
Size
227KB
-
Sample
241031-f18hnaslgn
-
MD5
5bf15d22b81f8487a3ba892c44b48e80
-
SHA1
b1e36876f0e7788a646844f08f32a0d17ae335bf
-
SHA256
3ee237cbbcd082d1668f330d6c2aff90e4d965b343aca348d64a3c23cf394b67
-
SHA512
f7889333a476acb65a5a9a5e4076d9060471a28dfda46e67955c849f54b13c74aafa408de9ed9b6c4f3be7b8990c873407927fdd87afee7ef7b6a0a7d9e3c6f2
-
SSDEEP
6144:eloZM+rIkd8g+EtXHkv/iD4Sf5pBPUonVWvRsY9w4b8e1mBii:IoZ1L+EP8Sf5pBPUonVWvRsY9hO
Behavioral task
behavioral1
Sample
dmbral.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1301414253722603540/jg-6zDziHcOTDOKtI8ajj94GfsHIjqSlAXLi1SgBHImM2bg01nh8sCJuz98O7QdqPpkO
Targets
-
-
Target
dmbral.exe
-
Size
227KB
-
MD5
5bf15d22b81f8487a3ba892c44b48e80
-
SHA1
b1e36876f0e7788a646844f08f32a0d17ae335bf
-
SHA256
3ee237cbbcd082d1668f330d6c2aff90e4d965b343aca348d64a3c23cf394b67
-
SHA512
f7889333a476acb65a5a9a5e4076d9060471a28dfda46e67955c849f54b13c74aafa408de9ed9b6c4f3be7b8990c873407927fdd87afee7ef7b6a0a7d9e3c6f2
-
SSDEEP
6144:eloZM+rIkd8g+EtXHkv/iD4Sf5pBPUonVWvRsY9w4b8e1mBii:IoZ1L+EP8Sf5pBPUonVWvRsY9hO
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1