General
-
Target
https://mega.nz/file/QNZwBbjJ#PHLqwt00ry4Q-QvHWhv6W2UEeBIriGKj19Wo1wIGRHU
-
Sample
250330-3ym59sywgx
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/QNZwBbjJ#PHLqwt00ry4Q-QvHWhv6W2UEeBIriGKj19Wo1wIGRHU
Resource
win10v2004-20250314-en
18 signatures
150 seconds
Malware Config
Extracted
Family
vidar
Version
13.3
Botnet
71edc90f2365e0044914bce30b7b2b25
C2
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
Attributes
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Targets
-
-
Target
https://mega.nz/file/QNZwBbjJ#PHLqwt00ry4Q-QvHWhv6W2UEeBIriGKj19Wo1wIGRHU
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Suspicious use of SetThreadContext
-