General

  • Target

    2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom

  • Size

    1.9MB

  • Sample

    250331-cnywxatpt8

  • MD5

    ba7cfbfe4ee11ed0bb81a7b71de91922

  • SHA1

    08f3a7cd51e1ea055ff7fbdcbd93c08b689773bc

  • SHA256

    49c8db48c43861be5087f96e5f934f8f6e3a3931e75613fd87127fa29edd62f1

  • SHA512

    3121d0f1e389d9f9b5faeebfa35e1a218f1a5c594beac41106c5cb85c5f6f7a6ffbab58035517833c36d6a42550156e19d0d832c80742264b4cdfb68d61175b6

  • SSDEEP

    24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZw1lUR:LnFFytug1lUR

Malware Config

Extracted

Family

vidar

Version

13.3

Botnet

23b8a0e48f77dc82cb41b2936121fd07

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom

    • Size

      1.9MB

    • MD5

      ba7cfbfe4ee11ed0bb81a7b71de91922

    • SHA1

      08f3a7cd51e1ea055ff7fbdcbd93c08b689773bc

    • SHA256

      49c8db48c43861be5087f96e5f934f8f6e3a3931e75613fd87127fa29edd62f1

    • SHA512

      3121d0f1e389d9f9b5faeebfa35e1a218f1a5c594beac41106c5cb85c5f6f7a6ffbab58035517833c36d6a42550156e19d0d832c80742264b4cdfb68d61175b6

    • SSDEEP

      24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZw1lUR:LnFFytug1lUR

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks