Darth Vidar: Evolution of Threat Infrastructure at Team Cymru

Team Cymru analyzes Vidar’s evolving threat infrastructure, highlighting domain shifts, proxy configurations, and anonymization methods (including Tor and Hola VPN) that complicate analysis. The post also covers a two-tier management architecture, payload updates (e.g., Opera Crypto form-grabbing) and broader infrastructure expansion, foreshadowing more campaigns to come. hashtags: #Vidar #TeamCymru #DJVU #OperaCrypto #Tor #HolaVPN #VidarC2

Keypoints

  • Vidar operators are using VPN gateways and Tor to anonymize operator activity, complicating comprehensive threat visibility.
  • Vidar infrastructure is expanding, with expectations of a new wave of customers and campaigns in the near term.
  • Infrastructure is split into two parts: a standard setup for customers and a separate management layer for operators (and potentially premium users).
  • The Vidar website has migrated domains (my-vidar.com to my-odin.com) and uses SSL certificates tied to hosting IPs, indicating ongoing infrastructure migration.
  • The Vidar web portal at /auth/ is used for campaign management and requires credentials plus a Google Authenticator token, suggesting a maintained operator-facing interface.
  • Archive Vida.tar.bz2 contains all Vidar web-server requirements and the payload, with install.sh and other files revealing deployment steps for new campaigns.
  • Proxy configuration (proxy.conf) reveals how C2 access is orchestrated, including a rotating proxy_pass IP and a 403/empty-User-Agent access rule to manage authentication.
  • Vidar payload updates since 2023 include form-grabbing for Opera Crypto, DJVU, and deployment alongside other loaders like IcedID and Redline Stealer, signaling ongoing evolution of capabilities.

MITRE Techniques

  • [T1090.004] Multi-hop Proxy – Vidar uses VPN gateways and Tor to anonymize operators; “Russian VPN gateways are potentially providing anonymity for Vidar operators / customers, making it more challenging for analysts to have a complete overview of this threat. These gateways now appear to be migrating to Tor.”
  • [T1583] Acquire Infrastructure – Vidar operators appear to be expanding their infrastructure, so analysts need to keep them in their sights. We expect a new wave of customers and as a result, an increase of campaigns in the upcoming weeks.
  • [T1105] Ingress Tool Transfer – A bash script which is run on the user / customer VPS server to download all the web-server requirements for the set up of a new Vidar campaign.
  • [T1071.001] Web Protocols – The proxy_pass IP is used to route traffic to TCP/80 on 185.173.93.98 (ADMAN-AS, RU), an IP which also receives inbound connections from two further IPs assigned to ‘ProManaged LLC’.
  • [T1566] Phishing – Delivery methodology for Vidar has varied over time, utilizing email / phishing lures and ‘poisoned’ cracked software targeting vendors such as AnyDesk and Windows, the latter leveraging SEO impersonation and YouTube videos to dupe users into downloading the malware.
  • [T1078] Valid Accounts – This path contains the Vidar users (or customers) web portal, where access to a dashboard is provided for the management of payloads related to their campaigns, victim assets, etc.

Indicators of Compromise

  • [Hash] Vidar sample hashes – 13e384c54054a094b8045928c8ec9d3697372e551e4887b4ea9e18e319f0f40b, 89710436ac93f0216ddd9338d76d1dcbf3cfb3991d72ae1a1d310eeb3699c439
  • [IP Address] Vidar main website hosts/management – 186.2.166.15 (my-odin.com)
  • [IP Address] Bofbot platform hosting – 186.2.166.10 (bofbot.com)
  • [IP Address] Proxy Pass (Jan 2023) – 94.231.205.192
  • [IP Address] Proxy Pass (Dec 2023) – 194.99.22.147
  • [IP Address] Rerouted proxy traffic – 185.173.93.98
  • [Domain] Vidar hosting domains – my-odin.com, old.my-vidar.com
  • [URL] Telegram datapack links – https://t.me/tgdatapacks, https://t.me/year2023start
  • [Domain] DJVU payload host – spaceris.com
  • [Domain] Vidar top domain – uaery.top
  • [IP Address] DJVU and related hosting – 175.120.254.9 (spaceris.com)
  • [Domain] Old/new Vidar domains – old.my-vidar.com, new.my-odin.com
  • [File] Vidar archive and scripts – Vida.tar.bz2, install.sh
  • [URL] Other discovery domains – https://t.me/jetbim, https://steamcommunity.com/profiles/76561199469677637

Read more: https://www.team-cymru.com/post/darth-vidar-the-dark-side-of-evolving-threat-infrastructure