General

  • Target

    dmbral.exe

  • Size

    227KB

  • Sample

    241031-f18hnaslgn

  • MD5

    5bf15d22b81f8487a3ba892c44b48e80

  • SHA1

    b1e36876f0e7788a646844f08f32a0d17ae335bf

  • SHA256

    3ee237cbbcd082d1668f330d6c2aff90e4d965b343aca348d64a3c23cf394b67

  • SHA512

    f7889333a476acb65a5a9a5e4076d9060471a28dfda46e67955c849f54b13c74aafa408de9ed9b6c4f3be7b8990c873407927fdd87afee7ef7b6a0a7d9e3c6f2

  • SSDEEP

    6144:eloZM+rIkd8g+EtXHkv/iD4Sf5pBPUonVWvRsY9w4b8e1mBii:IoZ1L+EP8Sf5pBPUonVWvRsY9hO

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1301414253722603540/jg-6zDziHcOTDOKtI8ajj94GfsHIjqSlAXLi1SgBHImM2bg01nh8sCJuz98O7QdqPpkO

Targets

    • Target

      dmbral.exe

    • Size

      227KB

    • MD5

      5bf15d22b81f8487a3ba892c44b48e80

    • SHA1

      b1e36876f0e7788a646844f08f32a0d17ae335bf

    • SHA256

      3ee237cbbcd082d1668f330d6c2aff90e4d965b343aca348d64a3c23cf394b67

    • SHA512

      f7889333a476acb65a5a9a5e4076d9060471a28dfda46e67955c849f54b13c74aafa408de9ed9b6c4f3be7b8990c873407927fdd87afee7ef7b6a0a7d9e3c6f2

    • SSDEEP

      6144:eloZM+rIkd8g+EtXHkv/iD4Sf5pBPUonVWvRsY9w4b8e1mBii:IoZ1L+EP8Sf5pBPUonVWvRsY9hO

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks