General

  • Target

    2025-02-20_6de71b0609cb1dcb47118be17d0d700c_frostygoop_poet-rat_snatch

  • Size

    9.8MB

  • Sample

    250220-t28fyaypbt

  • MD5

    6de71b0609cb1dcb47118be17d0d700c

  • SHA1

    98abf52de91ec36ac0d066345ecb8b2c96fdba50

  • SHA256

    55a16f01b6e2b0b124a1c4221e6d7b27dd4571b9b6b7575c3a731cc2b2d1a0e4

  • SHA512

    a0e01518116715d8e0196e09cf4036bf484eaa250b36151bf91fc91b3bd6bdca90cb7277ebc62e16a8c2d77d75f9ade558037cc6662e12aa8e85d02ac6d8c212

  • SSDEEP

    98304:Owk7LhMpZoJaUfW8+3CPPEuSPawmHvhfcmTVbeGG0u:Lk3h82+3CyawmHvumTVbeGG

Malware Config

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Targets

    • Target

      2025-02-20_6de71b0609cb1dcb47118be17d0d700c_frostygoop_poet-rat_snatch

    • Size

      9.8MB

    • MD5

      6de71b0609cb1dcb47118be17d0d700c

    • SHA1

      98abf52de91ec36ac0d066345ecb8b2c96fdba50

    • SHA256

      55a16f01b6e2b0b124a1c4221e6d7b27dd4571b9b6b7575c3a731cc2b2d1a0e4

    • SHA512

      a0e01518116715d8e0196e09cf4036bf484eaa250b36151bf91fc91b3bd6bdca90cb7277ebc62e16a8c2d77d75f9ade558037cc6662e12aa8e85d02ac6d8c212

    • SSDEEP

      98304:Owk7LhMpZoJaUfW8+3CPPEuSPawmHvhfcmTVbeGG0u:Lk3h82+3CyawmHvumTVbeGG

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks