MalwareBazaar Database

This page shows some basic information the YARA rule win_vidar including corresponding malware samples.

Database Entry


YARA Rule:win_vidar
Author:Matthew @ Embee_Research
Description:Detection of Vidar Stealer and Variants via strings present in final unpacked payloads
Firstseen:2023-06-11 14:46:42 UTC
Lastseen:2025-05-02 07:07:46 UTC
Sightings:119

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter