General

  • Target

    2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom

  • Size

    556KB

  • Sample

    250420-rv6bwsxzaw

  • MD5

    d510396277a666720627f5df62bd53eb

  • SHA1

    7acf176af54493aac227097b01a38242c069c28b

  • SHA256

    d28bc1b8975df8985c266826dc2111d6c50989fce391f72327171df965231166

  • SHA512

    e459a1212969aecd935bcf1182ad887b7cc5319ebf1b489ae9bc3a18e2855994de46ab7ff8a7d6f968ff844b8beac243bd3b4b2fd6a572bfc1ad0a689c960154

  • SSDEEP

    12288:sgSCNzaLuvMRXdxQBXZqEvRXJQNf+9LKLdEEo4Edka+9LKLdEEo4Edk:sgvFaKQdEOaKLdjRaaKLdjR

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

c466785b3a34d7b3c4d6db04a068b664

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom

    • Size

      556KB

    • MD5

      d510396277a666720627f5df62bd53eb

    • SHA1

      7acf176af54493aac227097b01a38242c069c28b

    • SHA256

      d28bc1b8975df8985c266826dc2111d6c50989fce391f72327171df965231166

    • SHA512

      e459a1212969aecd935bcf1182ad887b7cc5319ebf1b489ae9bc3a18e2855994de46ab7ff8a7d6f968ff844b8beac243bd3b4b2fd6a572bfc1ad0a689c960154

    • SSDEEP

      12288:sgSCNzaLuvMRXdxQBXZqEvRXJQNf+9LKLdEEo4Edka+9LKLdEEo4Edk:sgvFaKQdEOaKLdjRaaKLdjR

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks