Skip to content

Vidar

Also known as: Vidar Stealer

Vidar is an information stealer forked from the Arkei stealer codebase in late 2018, sold on Russian-speaking forums by a developer known as "Loadbaks". Pricing runs from $130 to $750 depending on subscription length. It shares its Arkei lineage with Mars Stealer and Lumma Stealer, and its C2 protocol was later copied directly by StealC.

The stealer uses a two-stage dead drop resolver for C2 communication. Hardcoded URLs point to legitimate social media profiles on Telegram, Steam Community, Mastodon, and TikTok, where the real C2 IP is embedded in the profile's name or description field. Once resolved, communication runs over standard HTTP/HTTPS -- an initial GET fetches the steal configuration, then collected data is packaged into a ZIP archive and exfiltrated via multipart form POST. C2 domains rotate roughly every four days.

Vidar targets browser credentials, cookies, and autofill data from Chrome and Firefox-based browsers, cryptocurrency wallets, 2FA application data, email client credentials (Outlook, Thunderbird), Telegram and Discord sessions, and Steam tokens. Version 2.0, released in October 2025, was rewritten from C++ to pure C with a multithreaded collection architecture and control flow flattening applied across all 274 functions. It also bypasses Chrome's AppBound encryption by launching browsers with debugging enabled and injecting into process memory.

Delivery leans on malvertising through Google Ads impersonating legitimate software, SEO poisoning via fake cracked software catalogs, and pay-per-install networks like PrivateLoader and SmokeLoader. A notable February 2025 incident involved Vidar distributed through PirateFi, a game published on Steam that infected roughly 1,500 users before removal. Vidar 2.0's release coincided with the Lumma Stealer takedown in May 2025, positioning it to absorb displaced customers.

C2 Infrastructure

Hosting/VPS100%

Last 7 days

Apr 14, 2026
C2 Hosts: 15
Apr 13, 2026
C2 Hosts: 27
Apr 12, 2026
C2 Hosts: 8
Apr 11, 2026
C2 Hosts: 10
Apr 10, 2026
C2 Hosts: 17
Apr 9, 2026
C2 Hosts: 18
Apr 8, 2026
C2 Hosts: 22

Further Reading

Darth Vidar: The Dark Side of Evolving Threat Infrastructure

Team Cymru's infrastructure analysis using NetFlow and passive DNS. Maps Vidar's dual-tier backend, Moldova/Russia hosting, VPN anonymization, and proxy rotation.

team-cymru.com
Unveiling of a Large Resilient Infrastructure Distributing Information Stealers

Sekoia maps the 250+ domain distribution network used for Vidar and Raccoon. Full SEO poisoning chain from fake cracked software catalogs to GitHub-hosted payloads.

blog.sekoia.io
How Vidar Stealer 2.0 Upgrades Infostealer Capabilities

The most thorough analysis of Vidar 2.0's C rewrite. Covers control flow flattening across all 274 functions, AppBound encryption bypass, and multithreaded collection.

trendmicro.com
Tracking Vidar Infrastructure with Censys

C2 server fingerprinting via hardcoded TLS certificate subject/issuer fields. Identified 22 unique C2 IPs, mostly on Hetzner in Germany/Finland.

censys.com
Vidar Stealer: Revealing A New Deception Strategy

Analysis of the PirateFi Steam game incident. Documents execution hijacking via RtlUserThreadStart pointer manipulation. Only 5 VirusTotal detections at discovery.

gdatasoftware.com
Vidar Network: Analyzing a Prolific Info Stealer

Network behavioral detection perspective. Vidar caught through anomalous HTTP patterns, not IOCs. Full communication sequence from DDR fetch through ZIP exfiltration.

darktrace.com
StealC: A Copycat of Vidar and Raccoon Infostealers

Documents how Vidar's C2 protocol became a template for the ecosystem. StealC developer confirmed building on Vidar and Raccoon code.

blog.sekoia.io
Arkei Variants: From Vidar to Mars Stealer

SANS ISC's canonical family tree tracing Arkei to Vidar to Oski to Mars Stealer. Compares infection traffic and exfiltration patterns across all variants.

isc.sans.edu
GitCaught: Threat Actor Leverages GitHub for Malicious Infrastructure

Recorded Future documents a 2024 campaign distributing Vidar, Lumma, AMOS, and Octo from a single GitHub profile, sharing C2 infrastructure across Windows/macOS/Android.

recordedfuture.com
Vidar Distributed Through Backdoored Windows 11 Downloads

Early documentation (2022) of the Telegram dead drop resolver mechanism and backdoored Windows 11 ISO delivery vector.

zscaler.com