Description
Vidar is an infostealer based on Arkei stealer.
8b2fc3bb6447331f0eb3e849df926209614f25b88de9baff4a447da95948bf3f
628KB
220215-j8e3vseagj
77f161d85c24320576c3cadbf3a15533
f29f7facad8e1b16254b6394304c0afc09a6241f
8b2fc3bb6447331f0eb3e849df926209614f25b88de9baff4a447da95948bf3f
720d20d50713f6efef3bfd234dc0dc8c5eebbbc2d367641ea8534ce6e1f15212b6ed0d8b280159105f00a6562fdd8daf7dc5bca20d40b9c660bcd2fdc92530a5
Family | vidar |
Version | 48.3 |
Botnet | 937 |
Attributes |
profile_id 937 |
8b2fc3bb6447331f0eb3e849df926209614f25b88de9baff4a447da95948bf3f
77f161d85c24320576c3cadbf3a15533
628KB
f29f7facad8e1b16254b6394304c0afc09a6241f
8b2fc3bb6447331f0eb3e849df926209614f25b88de9baff4a447da95948bf3f
720d20d50713f6efef3bfd234dc0dc8c5eebbbc2d367641ea8534ce6e1f15212b6ed0d8b280159105f00a6562fdd8daf7dc5bca20d40b9c660bcd2fdc92530a5
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.