Malware Analysis: Vidar Stealer

Malware Analysis: Vidar Stealer

This report provides a comprehensive overview of Vidar’s static and dynamic analysis results. In particular, the malware’s decryption methods, data collection processes, targeted platforms and command and control (C2) methods are analysed in detail. The findings provide important insights into how the malware operates and how it bypasses defence mechanisms.


    I have read and understood the Clarification Text on the processing of personal data.

    ⠀⠀⠀⠀⠀⠀⠀⠀