General

  • Target

    geris.exe

  • Size

    634KB

  • Sample

    210507-d83q61f9ax

  • MD5

    07407178322efcd6b0622a631f55ebec

  • SHA1

    5a65257913637b2028fd765ec8991ccbe5f360ff

  • SHA256

    e9e0c736b44df5d974c2f8d778871c8df70d96062c22ce98c9f955f2eedd10b6

  • SHA512

    d5293e223376eb6bb711dbb15e94cbb352127660da9a5c7542ace70ffa8a79a150308ab0cc4d32291685294b320ff6cbf3009bcbb4c2156c970e71d9137c4ced

Malware Config

Targets

    • Target

      geris.exe

    • Size

      634KB

    • MD5

      07407178322efcd6b0622a631f55ebec

    • SHA1

      5a65257913637b2028fd765ec8991ccbe5f360ff

    • SHA256

      e9e0c736b44df5d974c2f8d778871c8df70d96062c22ce98c9f955f2eedd10b6

    • SHA512

      d5293e223376eb6bb711dbb15e94cbb352127660da9a5c7542ace70ffa8a79a150308ab0cc4d32291685294b320ff6cbf3009bcbb4c2156c970e71d9137c4ced

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks