General

  • Target

    2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom

  • Size

    1.9MB

  • Sample

    250331-ez7djaszh1

  • MD5

    93079de0bd272e60957277651faba8e6

  • SHA1

    6881ba19895707f88b3a25dace643ee450d5e978

  • SHA256

    87456e358fac3b5c8c3c1997cc4b5a4c692073972a08033837f15d022086668c

  • SHA512

    127a1db9614d1a0f9da080a83ee260e47eb604baf7f412c690e0f908f27db32620d2bd28a6c4487c99db944a10816db0d035891ca69dc2b3a26001059e1f70f3

  • SSDEEP

    24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZwGlUR:LnFFytugGlUR

Malware Config

Extracted

Family

vidar

Version

13.3

Botnet

861aaf32ff897d13c49344e110765213

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom

    • Size

      1.9MB

    • MD5

      93079de0bd272e60957277651faba8e6

    • SHA1

      6881ba19895707f88b3a25dace643ee450d5e978

    • SHA256

      87456e358fac3b5c8c3c1997cc4b5a4c692073972a08033837f15d022086668c

    • SHA512

      127a1db9614d1a0f9da080a83ee260e47eb604baf7f412c690e0f908f27db32620d2bd28a6c4487c99db944a10816db0d035891ca69dc2b3a26001059e1f70f3

    • SSDEEP

      24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZwGlUR:LnFFytugGlUR

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks