Vidar Infostealer in Action

From API Hooking to Covert Data Exfiltration


Aryaka Threat Research Labs has analyzed a new variant of Vidar, a long-running infostealer sold under the Malware-as-a-Service (MaaS) model. Since 2018, Vidar has evolved with encrypted C2 channels, LOLBin abuse, and covert exfiltration to stay effective against modern defenses.

Targeting Windows systems, it steals a wide range of assets—including browser credentials, cryptocurrency wallets, 2FA data, messaging tokens, and personal documents—before exfiltrating them to attacker infrastructure for resale or further exploitation.

Key insights include:

  • Enhanced stealth through encrypted command-and-control (C2) channels
  • Abuse of Living-off-the-Land Binaries (LOLBins) for persistence and evasion
  • Targeting Windows environments with extensive data theft capabilities
  • Harvests credentials, cookies, credit cards, wallets, 2FA data, tokens, documents, and screenshots
  • Data is packaged and exfiltrated for resale or further exploitation on underground markets