General

  • Target

    2025-03-31_61903c7168838b2fd1c701756d1efb15_black-basta_cobalt-strike_ryuk_satacom

  • Size

    1.9MB

  • Sample

    250331-q5w1ja1vdw

  • MD5

    61903c7168838b2fd1c701756d1efb15

  • SHA1

    918de67ab700e3856d6ee40d239e68c0e806d11f

  • SHA256

    e705563d5634d217e0ebb3dcde0326e0cae0d57bc866871d8f4032747c8347f6

  • SHA512

    5f513cbc9e3fba4c3c0707d3ebca755664b09a8e8ce796826036a57b2ad6a6eec7dfa1b9fcec1b99af696bac71fbb6cfd0254f841e1dd466f3d7b61f4edf4c3c

  • SSDEEP

    24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZwglUR:LnFFytugglUR

Malware Config

Extracted

Family

vidar

Version

13.3

Botnet

286abd424eeeb855a080435369086f7f

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-03-31_61903c7168838b2fd1c701756d1efb15_black-basta_cobalt-strike_ryuk_satacom

    • Size

      1.9MB

    • MD5

      61903c7168838b2fd1c701756d1efb15

    • SHA1

      918de67ab700e3856d6ee40d239e68c0e806d11f

    • SHA256

      e705563d5634d217e0ebb3dcde0326e0cae0d57bc866871d8f4032747c8347f6

    • SHA512

      5f513cbc9e3fba4c3c0707d3ebca755664b09a8e8ce796826036a57b2ad6a6eec7dfa1b9fcec1b99af696bac71fbb6cfd0254f841e1dd466f3d7b61f4edf4c3c

    • SSDEEP

      24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZwglUR:LnFFytugglUR

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks