General

  • Target

    2025-02-16_b8930ce311970e82b7b52dbfa4d81187_frostygoop_poet-rat_snatch

  • Size

    6.2MB

  • Sample

    250216-ykpdysxjcl

  • MD5

    b8930ce311970e82b7b52dbfa4d81187

  • SHA1

    7aaf10c720b8cfd1b9daa0174de934a9fa31f410

  • SHA256

    4f6f1b2e6fc03473bf5d66cca5013f5ed5a96df2ac46b38e525ee733d230cf88

  • SHA512

    5f75bcf4d1746ce1809f94a306d085525b07998929ce4e8b3cfdc40d7338b9e137f1b85819658125966ee3b4357a82dd4236ea7dc581805d06b86b5a3300b37f

  • SSDEEP

    49152:+U4K1Qy8nPDdZiBSFfscuj9ADJZlShhV7+pXLRB5TYAUhJSh7DUtiGlMlHDNuc6P:+NbrnrShj9AVYhgB5IJsnUw918Svlj

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Targets

    • Target

      2025-02-16_b8930ce311970e82b7b52dbfa4d81187_frostygoop_poet-rat_snatch

    • Size

      6.2MB

    • MD5

      b8930ce311970e82b7b52dbfa4d81187

    • SHA1

      7aaf10c720b8cfd1b9daa0174de934a9fa31f410

    • SHA256

      4f6f1b2e6fc03473bf5d66cca5013f5ed5a96df2ac46b38e525ee733d230cf88

    • SHA512

      5f75bcf4d1746ce1809f94a306d085525b07998929ce4e8b3cfdc40d7338b9e137f1b85819658125966ee3b4357a82dd4236ea7dc581805d06b86b5a3300b37f

    • SSDEEP

      49152:+U4K1Qy8nPDdZiBSFfscuj9ADJZlShhV7+pXLRB5TYAUhJSh7DUtiGlMlHDNuc6P:+NbrnrShj9AVYhgB5IJsnUw918Svlj

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks