Vidar
Also known as: Vidar Stealer
Vidar is an information stealer forked from the Arkei stealer codebase in late 2018, sold on Russian-speaking forums by a developer known as "Loadbaks". Pricing runs from $130 to $750 depending on subscription length. It shares its Arkei lineage with Mars Stealer and Lumma Stealer, and its C2 protocol was later copied directly by StealC.
The stealer uses a two-stage dead drop resolver for C2 communication. Hardcoded URLs point to legitimate social media profiles on Telegram, Steam Community, Mastodon, and TikTok, where the real C2 IP is embedded in the profile's name or description field. Once resolved, communication runs over standard HTTP/HTTPS -- an initial GET fetches the steal configuration, then collected data is packaged into a ZIP archive and exfiltrated via multipart form POST. C2 domains rotate roughly every four days.
Vidar targets browser credentials, cookies, and autofill data from Chrome and Firefox-based browsers, cryptocurrency wallets, 2FA application data, email client credentials (Outlook, Thunderbird), Telegram and Discord sessions, and Steam tokens. Version 2.0, released in October 2025, was rewritten from C++ to pure C with a multithreaded collection architecture and control flow flattening applied across all 274 functions. It also bypasses Chrome's AppBound encryption by launching browsers with debugging enabled and injecting into process memory.
Delivery leans on malvertising through Google Ads impersonating legitimate software, SEO poisoning via fake cracked software catalogs, and pay-per-install networks like PrivateLoader and SmokeLoader. A notable February 2025 incident involved Vidar distributed through PirateFi, a game published on Steam that infected roughly 1,500 users before removal. Vidar 2.0's release coincided with the Lumma Stealer takedown in May 2025, positioning it to absorb displaced customers.
C2 Infrastructure
Last 7 days
| Date | C2 Hosts |
|---|---|
| Apr 14, 2026 | 15 |
| Apr 13, 2026 | 27 |
| Apr 12, 2026 | 8 |
| Apr 11, 2026 | 10 |
| Apr 10, 2026 | 17 |
| Apr 9, 2026 | 18 |
| Apr 8, 2026 | 22 |
Further Reading
Team Cymru's infrastructure analysis using NetFlow and passive DNS. Maps Vidar's dual-tier backend, Moldova/Russia hosting, VPN anonymization, and proxy rotation.
Sekoia maps the 250+ domain distribution network used for Vidar and Raccoon. Full SEO poisoning chain from fake cracked software catalogs to GitHub-hosted payloads.
The most thorough analysis of Vidar 2.0's C rewrite. Covers control flow flattening across all 274 functions, AppBound encryption bypass, and multithreaded collection.
C2 server fingerprinting via hardcoded TLS certificate subject/issuer fields. Identified 22 unique C2 IPs, mostly on Hetzner in Germany/Finland.
Analysis of the PirateFi Steam game incident. Documents execution hijacking via RtlUserThreadStart pointer manipulation. Only 5 VirusTotal detections at discovery.
Network behavioral detection perspective. Vidar caught through anomalous HTTP patterns, not IOCs. Full communication sequence from DDR fetch through ZIP exfiltration.
Documents how Vidar's C2 protocol became a template for the ecosystem. StealC developer confirmed building on Vidar and Raccoon code.
SANS ISC's canonical family tree tracing Arkei to Vidar to Oski to Mars Stealer. Compares infection traffic and exfiltration patterns across all variants.
Recorded Future documents a 2024 campaign distributing Vidar, Lumma, AMOS, and Octo from a single GitHub profile, sharing C2 infrastructure across Windows/macOS/Android.
Early documentation (2022) of the Telegram dead drop resolver mechanism and backdoored Windows 11 ISO delivery vector.