General

  • Target

    2025-04-18_017e837d6e14a2412d5b7b385f8bca28_black-basta_cobalt-strike_ryuk_satacom

  • Size

    573KB

  • Sample

    250418-w4wahavjt7

  • MD5

    017e837d6e14a2412d5b7b385f8bca28

  • SHA1

    3596a371841ec6cad17cdbfcde4425d980cb69e5

  • SHA256

    8a51d26be760d2515fdbe742bc84bd08d05d4e7f665bdd3c37b8c425f839675e

  • SHA512

    3aa9e36006182f8e640d8efb84fb505d8449c0d7feea0a803c5e7b283a11603ced81b076016acd15aedb15b0a1f060b7c76ebc53063c8fe9f54be925bf79c855

  • SSDEEP

    12288:5ONjf6etLUrXh2ceG+9LKLdEEo4Edka+9LKLdEEo4Edk:5mfZxMaKLdjRaaKLdjR

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

c466785b3a34d7b3c4d6db04a068b664

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-04-18_017e837d6e14a2412d5b7b385f8bca28_black-basta_cobalt-strike_ryuk_satacom

    • Size

      573KB

    • MD5

      017e837d6e14a2412d5b7b385f8bca28

    • SHA1

      3596a371841ec6cad17cdbfcde4425d980cb69e5

    • SHA256

      8a51d26be760d2515fdbe742bc84bd08d05d4e7f665bdd3c37b8c425f839675e

    • SHA512

      3aa9e36006182f8e640d8efb84fb505d8449c0d7feea0a803c5e7b283a11603ced81b076016acd15aedb15b0a1f060b7c76ebc53063c8fe9f54be925bf79c855

    • SSDEEP

      12288:5ONjf6etLUrXh2ceG+9LKLdEEo4Edka+9LKLdEEo4Edk:5mfZxMaKLdjRaaKLdjR

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks