General

  • Target

    2025-04-18_064e51084b64d71b80d70894ab511246_cobalt-strike

  • Size

    1.7MB

  • Sample

    250418-2arm4swyht

  • MD5

    064e51084b64d71b80d70894ab511246

  • SHA1

    80a04ee1a2c62e4a312fb9387508c3d08d700ecd

  • SHA256

    0921b5c74e073c331a8ba6396e8ffe3d90486d7cec0b54dd8801112e33cdb177

  • SHA512

    fcc27c0a60c955c7feea8ba757a148d189a44e90e512f57bb5b8e9e0ba1b6e200cb39d9a0609de0cea1959e5d4df36f30ee6ce1ccb2b601bb860e53a5bfb6004

  • SSDEEP

    24576:6rloDyu6xW3AQpF0Fyrjw83M2HlA7Izl+63FZZ:oMyC3AQCyrjw88v7Izl+63F3

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

eb17a39311b2fbc653bb6a88c15634e4

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-04-18_064e51084b64d71b80d70894ab511246_cobalt-strike

    • Size

      1.7MB

    • MD5

      064e51084b64d71b80d70894ab511246

    • SHA1

      80a04ee1a2c62e4a312fb9387508c3d08d700ecd

    • SHA256

      0921b5c74e073c331a8ba6396e8ffe3d90486d7cec0b54dd8801112e33cdb177

    • SHA512

      fcc27c0a60c955c7feea8ba757a148d189a44e90e512f57bb5b8e9e0ba1b6e200cb39d9a0609de0cea1959e5d4df36f30ee6ce1ccb2b601bb860e53a5bfb6004

    • SSDEEP

      24576:6rloDyu6xW3AQpF0Fyrjw83M2HlA7Izl+63FZZ:oMyC3AQCyrjw88v7Izl+63F3

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks