Vidar Malware Uses Fake Activation Tool to Steal Passwords, Cookies, and Crypto Wallets


A new Vidar malware campaign is using a fake software activation tool to steal browser credentials, session cookies, cryptocurrency wallet files, and system data from Windows machines.

LevelBlue researchers found the activity during proactive threat hunting in a client environment. Their analysis showed a multi-stage infection chain that uses script masquerading, staged payload extraction, security process checks, and command-and-control communication.

Vidar is not a new malware family. It has been active since late 2018 and was built from the source code of the older Arkei stealer. The latest campaign shows how attackers continue to wrap known infostealers in more evasive delivery chains.

Fake Microsoft Toolkit starts the infection

The attack begins when a user runs MicrosoftToolkit.exe, a commonly abused hack tool often presented as a software activation utility. This gives the malware a user-driven entry point instead of relying on a phishing attachment or browser exploit.

After execution, the tool launches a command shell and starts preparing the next stage. A disguised file named Swingers.dot is renamed into a batch script and executed.

This file extension trick helps the attack bypass simple security controls that block obvious script files. It also makes the chain look less suspicious during the early stage of execution.

Key facts at a glance

ItemDetails
Malware familyVidar
Malware typeInformation stealer
Initial fileMicrosoftToolkit.exe
Disguised scriptSwingers.dot renamed as a batch file
LoaderReplies.scr, an AutoIt-compiled loader
Payload fileD
Main targetsBrowser credentials, cookies, crypto wallets, and system data
Reported C2 indicatorstelegram.me, Steam profile URL, and gz.technicalprorj.xyz

The loader checks security tools before running Vidar

The batch stage uses Windows commands such as tasklist and findstr to look for running processes. This helps the malware identify security tools and analysis environments before it moves deeper into the infection chain.

The attack then uses extract32.exe to extract additional components and launches Replies.scr with an external payload file named D. Replies.scr is an AutoIt-compiled binary that acts as a loader instead of the final payload.

AutoIt is a legitimate Windows scripting language, but attackers often abuse it because compiled AutoIt programs can look like normal applications. In this campaign, AutoIt helps reconstruct and execute the Vidar payload through staged file manipulation.

Vidar targets data that attackers can reuse or sell

Once deployed, Vidar focuses on data that can quickly turn into account takeover, fraud, or follow-on attacks. It targets browser-stored credentials, saved session cookies, cryptocurrency wallet files, and user and system information.

Stolen browser cookies can be especially dangerous because they may let attackers access accounts without immediately needing the victim’s password. Wallet files can also expose cryptocurrency funds if attackers obtain the right supporting data.

On business systems, the risk can extend beyond one user. A stolen browser session, VPN credential, admin login, or cloud account token can give attackers a path into company systems.

Command-and-control uses common web services

LevelBlue observed Vidar-related communication using Telegram and a Steam profile URL. This kind of infrastructure abuse helps attackers hide configuration retrieval inside traffic that may look normal at first glance.

Attack tree observed in LevelBlue’s EDR

The malware also performed DNS activity tied to gz.technicalprorj.xyz. LevelBlue included this domain in its hunting guidance for defenders monitoring suspicious outbound traffic.

By using public platforms and web-based communication, attackers can make blocking harder. Security teams may hesitate to block large legitimate services entirely, so defenders need more precise detection based on process behavior and unusual connections.

The malware removes evidence after execution

The campaign includes a cleanup routine after the payload runs. LevelBlue said the malware deletes dropped files, resets attributes, frees memory, and terminates its own process.

This cleanup behavior complicates incident response because investigators may find fewer files on disk after the attack completes. It also reduces the chance that simple file-based detections will catch the full chain later.

The malware also uses anti-debugging and anti-analysis checks. These checks help it detect when researchers or security tools are watching execution and may cause it to change behavior.

What security teams should monitor

  • Execution of MicrosoftToolkit.exe or similar unauthorized activation tools.
  • Files renamed from .dot to .bat before execution.
  • Unexpected AutoIt-compiled binaries such as Replies.scr.
  • Command-line use of tasklist, findstr, extract32.exe, and waitfor.exe in the same chain.
  • Outbound connections from unusual scripts or screensaver files.
  • DNS lookups for gz.technicalprorj.xyz.
  • Suspicious access to Telegram or Steam URLs from unknown binaries.
  • Rapid file creation followed by deletion in temporary or user-controlled paths.

What affected users should do

Any system that executed this chain should be isolated from the network immediately. That helps stop further data theft and reduces the risk of lateral movement.

Organizations should reimage affected systems because Vidar can be used with additional payloads. Cleaning only the visible files may not remove every component or follow-on tool.

Users should reset browser passwords, email passwords, VPN credentials, cloud accounts, and administrator accounts from a clean device. They should also invalidate active sessions and enforce multi-factor authentication wherever possible.

FAQ

What is Vidar malware?

Vidar is an information stealer that targets credentials, browser data, cryptocurrency wallet files, cookies, and system information from infected Windows machines.

How does this Vidar campaign start?

The campaign starts with MicrosoftToolkit.exe, a commonly abused software activation tool that tricks users into running the first stage manually.

What does Replies.scr do?

Replies.scr is an AutoIt-compiled loader. It processes an external payload file and helps launch the Vidar stealer.

Why are stolen cookies dangerous?

Stolen session cookies can help attackers access accounts without typing the password again, especially when the session remains active.

Summary

  1. Vidar malware is using a multi-stage Windows infection chain to steal sensitive data.
  2. The campaign starts with MicrosoftToolkit.exe and uses disguised .dot files, batch scripts, and an AutoIt loader.
  3. The malware targets browser credentials, session cookies, crypto wallets, and system data.
  4. Attackers use public platforms such as Telegram and Steam as part of command-and-control activity.
  5. Defenders should block unauthorized activation tools, monitor renamed scripts, and reimage infected systems.
Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages