General

  • Target

    libcares-2.dll

  • Size

    4.3MB

  • Sample

    250420-wyarlsvmt3

  • MD5

    93fb1d866472e1280e4a93343db3ed13

  • SHA1

    fcc4cbab5f13bfbcac6b7610309ca6c3bdbd58ac

  • SHA256

    089da3c21bdd12618e7d5f757d1742a48dc961b367a8515703c94d9febc965c9

  • SHA512

    79d49f319ab38945714b59c071ee61888135326718ffb91c333806c31f8b36b108ca121884366092aee4fbc2991af16fc4eb811c25a66590911d0493d028448e

  • SSDEEP

    49152:TO4Yher6KfKDd0faVjaNpYzooELJJC4L0357+LnT3ODeJaYxdVIwG4HK0VglLa3N:TVrDQhzooyrnRvOqx9

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

eb17a39311b2fbc653bb6a88c15634e4

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      libcares-2.dll

    • Size

      4.3MB

    • MD5

      93fb1d866472e1280e4a93343db3ed13

    • SHA1

      fcc4cbab5f13bfbcac6b7610309ca6c3bdbd58ac

    • SHA256

      089da3c21bdd12618e7d5f757d1742a48dc961b367a8515703c94d9febc965c9

    • SHA512

      79d49f319ab38945714b59c071ee61888135326718ffb91c333806c31f8b36b108ca121884366092aee4fbc2991af16fc4eb811c25a66590911d0493d028448e

    • SSDEEP

      49152:TO4Yher6KfKDd0faVjaNpYzooELJJC4L0357+LnT3ODeJaYxdVIwG4HK0VglLa3N:TVrDQhzooyrnRvOqx9

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks