Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Vidar Stealer
ID: a5f09faf59527c9f13c715253f52dc7141500
Crimeware
Banking Malware
Botnet
Spyware/Stealer
Threat types: Malware, Credential Theft, Data Exfiltration
Progress: 67%
Completeness: 66%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Vidar | VidarStealer | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Vidar is a Windows infostealer commonly described as MaaS. It steals browser credentials and session artifacts, payment/autofill data, and crypto wallet artifacts; it exfiltrates over HTTP/S to operator infrastructure and may be used to deliver follow-on payloads (including ransomware) depending on the operator.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1204 | User Execution | TA0002 |
|
| T1566 | Phishing | TA0001 |
|
| T1555 | Credentials from Password Stores | TA0006 |
|
| T1056 | Input Capture | TA0006 TA0009 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.