General

  • Target

    2025-03-31_b909c5c9651fa47d445718066795926b_black-basta_cobalt-strike_ryuk_satacom

  • Size

    1.9MB

  • Sample

    250331-hpb2esxmy3

  • MD5

    b909c5c9651fa47d445718066795926b

  • SHA1

    c93031fac22a12b64dee3c745dd6d31ca35ea484

  • SHA256

    374bec44744d1a5bf3ba7f9fdcab61f6e7bc9d748535d491119cf9c010f9222d

  • SHA512

    691fd17a2a9e2db4e4e41c96c4d0825037d34bcf8920d3bcd70dd787bfc7e942f1f3ea6542a80793c8474a04ffcb213f75887d604eeec9e4bce7cbddd20c460a

  • SSDEEP

    24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZwulUR:LnFFytugulUR

Malware Config

Extracted

Family

vidar

Version

13.3

Botnet

80926b0860f8c2159b69dc78513fdf83

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-03-31_b909c5c9651fa47d445718066795926b_black-basta_cobalt-strike_ryuk_satacom

    • Size

      1.9MB

    • MD5

      b909c5c9651fa47d445718066795926b

    • SHA1

      c93031fac22a12b64dee3c745dd6d31ca35ea484

    • SHA256

      374bec44744d1a5bf3ba7f9fdcab61f6e7bc9d748535d491119cf9c010f9222d

    • SHA512

      691fd17a2a9e2db4e4e41c96c4d0825037d34bcf8920d3bcd70dd787bfc7e942f1f3ea6542a80793c8474a04ffcb213f75887d604eeec9e4bce7cbddd20c460a

    • SSDEEP

      24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZwulUR:LnFFytugulUR

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks