General

  • Target

    2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch

  • Size

    5.7MB

  • Sample

    250219-1ffmcszjby

  • MD5

    e75ea1fd0fb29383b2f4822022ddf34c

  • SHA1

    c30e9c9b52b5394b591bfb40b13ef594ccedf316

  • SHA256

    f9a8f7bfe93aff2b25c733f46a9a5a7cbf366cb12cdee3a1262f1f737ea5204f

  • SHA512

    5662eebaf91c295aa56409e307ad09b47828b7e8986d906fa7e0d0b0aaba8008d6a0227bd8e770fe1138b75059e5c0505e66dc35685f07ed401ce2c462f77ce1

  • SSDEEP

    49152:uYyT7q1dtjhwEM2wM1CRxMzIouecTPycvms1WmZURWBZQApOsmeW7LD/OI0x1DPS:1m7K7jNM2qazuycJ0X2T

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Targets

    • Target

      2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch

    • Size

      5.7MB

    • MD5

      e75ea1fd0fb29383b2f4822022ddf34c

    • SHA1

      c30e9c9b52b5394b591bfb40b13ef594ccedf316

    • SHA256

      f9a8f7bfe93aff2b25c733f46a9a5a7cbf366cb12cdee3a1262f1f737ea5204f

    • SHA512

      5662eebaf91c295aa56409e307ad09b47828b7e8986d906fa7e0d0b0aaba8008d6a0227bd8e770fe1138b75059e5c0505e66dc35685f07ed401ce2c462f77ce1

    • SSDEEP

      49152:uYyT7q1dtjhwEM2wM1CRxMzIouecTPycvms1WmZURWBZQApOsmeW7LD/OI0x1DPS:1m7K7jNM2qazuycJ0X2T

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks