General

  • Target

    2025-04-20_7f8e5fe3443a730c3b55e170ed25e7a8_black-basta_cobalt-strike_ryuk_satacom

  • Size

    808KB

  • Sample

    250420-gaadlsxlz6

  • MD5

    7f8e5fe3443a730c3b55e170ed25e7a8

  • SHA1

    5ad4bb5a34b5906f99eb3bdedb48bc517d18136b

  • SHA256

    7c1bb5e9ae1bf20dc9aafb0605b15bd688f7d5e23db424e019315f412f11ec42

  • SHA512

    e9f7a3565868a606906d757bb1e751586685038761e8aba38e3c9156235a1280d23fbe950ccb45d545d854d545da714bb07b90ee8eaf1b28f10214fca612f516

  • SSDEEP

    12288:zbGU3fK+OmAeJWcl28vZ2CYizu+9LKLdEEo4E7ka+9LKLdEEo4E7kaEO:vGU3bNkAuaKLdjDaaKLdjDat

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

0259016785c18ed951c497596f76958c

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-04-20_7f8e5fe3443a730c3b55e170ed25e7a8_black-basta_cobalt-strike_ryuk_satacom

    • Size

      808KB

    • MD5

      7f8e5fe3443a730c3b55e170ed25e7a8

    • SHA1

      5ad4bb5a34b5906f99eb3bdedb48bc517d18136b

    • SHA256

      7c1bb5e9ae1bf20dc9aafb0605b15bd688f7d5e23db424e019315f412f11ec42

    • SHA512

      e9f7a3565868a606906d757bb1e751586685038761e8aba38e3c9156235a1280d23fbe950ccb45d545d854d545da714bb07b90ee8eaf1b28f10214fca612f516

    • SSDEEP

      12288:zbGU3fK+OmAeJWcl28vZ2CYizu+9LKLdEEo4E7ka+9LKLdEEo4E7kaEO:vGU3bNkAuaKLdjDaaKLdjDat

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks