This report provides a comprehensive overview of Vidar’s static and dynamic analysis results. In particular, the malware’s decryption methods, data collection processes, targeted platforms and command and control (C2) methods are analysed in detail. The findings provide important insights into how the malware operates and how it bypasses defence mechanisms.