Vidar - Distribution Methods

File types, delivery vectors, and hosting infrastructure used to distribute Vidar.

Last updated: 2026-04-18

Understanding how Vidar reaches victims is critical for prevention. This page breaks down the file types used in distribution, the hosting infrastructure serving malicious payloads, and URLs tracked by URLhaus. Data is updated daily.

What Distribution Data Tells You

Shifts in file type distribution often signal changes in delivery tactics. For example, a move from .exe to .msi files may indicate operators adapting to Windows SmartScreen or email gateway filtering. A surge in .js or .vbs files suggests script-based delivery through phishing emails. Monitoring these patterns helps you tune your email security gateway rules and endpoint protection policies to block the current delivery method before it reaches end users.

Hosting Infrastructure

The hosting data below shows which domains and servers are actively distributing Vidar payloads. Add these to your DNS blocklists, web proxy deny rules, and firewall policies. Hosting infrastructure tends to rotate frequently as takedowns occur, so check this page regularly. All URL data is sourced from URLhaus. For hash-based indicators, see the IOC page. For sample details, see Vidar samples.

File Types (115 samples)

exe 103 (90%)
lnk 4 (3%)
zip 4 (3%)
ps1 3 (3%)
rar 1 (1%)

Malicious Distribution URLs (114)

https://mygoodblog.cyou/files/FAvFf4V3.exe
https://mygoodblog.sbs/files/FAvFf4V3.exe
https://bigblograin.bond/files/FAvFf4V3.exe
https://beacon-mysummitfcu.org/files/FAvFf4V3.exe
http://158.94.210.248/files/FAvFf4V3.exe
https://productionmaza.sbs/files/FAvFf4V3.exe
http://brukva.shop/files/FAvFf4V3.exe
https://bigbadwolf.click/files/FAvFf4V3.exe
https://bestwebchlen.cyou/files/FAvFf4V3.exe
https://krempie.xyz/files/FAvFf4V3.exe
https://biggestchlen.xyz/files/FAvFf4V3.exe
http://mygoodblog.bond/files/FAvFf4V3.exe
https://goodgoodmoon.bond/files/FAvFf4V3.exe
https://158.94.210.248/files/FAvFf4V3.exe
http://myverifyblog.sbs/files/FAvFf4V3.exe
http://cloudflare-check.cfd/files/FAvFf4V3.exe
http://bigboysclub.cyou/files/FAvFf4V3.exe
https://productionmaza.cfd/files/FAvFf4V3.exe
https://allplanetssame.cfd/files/FAvFf4V3.exe
https://antongandon.club/files/FAvFf4V3.exe
https://productionmaza.cyou/files/FAvFf4V3.exe
https://brukva.shop/files/FAvFf4V3.exe
https://mrazotalog.lol/files/FAvFf4V3.exe
https://myverifhouse.sbs/files/FAvFf4V3.exe
http://allplanetssame.cfd/files/FAvFf4V3.exe
https://sirata.asia/files/FAvFf4V3.exe
http://myverifhouse.sbs/files/FAvFf4V3.exe
https://mygoodblog.bond/files/FAvFf4V3.exe
https://microblob.bond/files/FAvFf4V3.exe
https://denegnet.click/files/FAvFf4V3.exe
https://blobtop.sbs/files/FAvFf4V3.exe
http://productionmaza.cfd/files/FAvFf4V3.exe
http://diddyparty.click/files/FAvFf4V3.exe
https://gooddogshop.click/files/FAvFf4V3.exe
https://etokrol.lol/files/FAvFf4V3.exe
http://productionmaza.cyou/files/FAvFf4V3.exe
https://myverifyblog.sbs/files/FAvFf4V3.exe
https://merengagoi.bond/files/FAvFf4V3.exe
https://blatnoitovar.xyz/files/FAvFf4V3.exe
https://bigboysclub.cyou/files/FAvFf4V3.exe
http://etokrol.lol/files/FAvFf4V3.exe
https://diddyparty.click/files/FAvFf4V3.exe
http://mymicroblog.lat/files/FAvFf4V3.exe
http://blatnoitovar.xyz/files/FAvFf4V3.exe
http://denegnet.click/files/FAvFf4V3.exe
http://mrazotalog.lol/files/FAvFf4V3.exe
http://mybiggestjoy.bond/files/FAvFf4V3.exe
https://cloudflare-check.cfd/files/FAvFf4V3.exe
https://mymicroblog.lat/files/FAvFf4V3.exe
https://mybiggestjoy.bond/files/FAvFf4V3.exe
https://microservisetrue.vip/fwefwe324234234rgeffwehtrwyrhtrhtqwfqwd31443wefefwwfer3232fewwefwefwefqgrqwtherergqefwefqweqfwqf32fefwsda/uploads/EFewefwewFEW342234423234feWEEFWWefewefweffewwefEWF.php?file=333.exe/
http://dl.armour-inc-down.net/in/?KIDDIONSMODMENU
https://248bestmoon.click/files/FAvFf4V3.exe
https://dl.armour-inc-down.net/in/?AdGuardPremiump6
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU4
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU7
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU3
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU6
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU9
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU8
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU5
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU2
https://dl.armour-inc-down.net/in/?KIDDIONSMODMENU1
http://62.60.226.159/Ni9n3sIO.exe
https://mybiggestjoy.bond/api/index.php?a=dl&token=fcdd5b796fbf5cb5614da7aaa4773fb404771c4821e4b8d30305ed8df58a2188&src=trindade.pe.gov.br&mode=cloudflare
http://192.177.26.196/files/vid/random.exe
http://192.177.26.196/files/7782139129/S6xWuZ1.exe
http://192.177.26.196/files/gop/random.exe
http://192.177.26.196/files/5900855435/eNLe4nm.exe
http://192.177.26.196/files/6608710704/ltjL6cP.exe
http://192.177.26.196/files/rdx/random.exe
http://80.89.224.210/1.exe
http://158.94.208.168/files/rdx/random.exe
http://158.94.208.168/files/6608710704/ltjL6cP.exe
http://188.137.249.159/1.exe
https://shop.pestodo.de/
http://158.94.208.168/files/7453936223/KAQ8PQ5.exe
http://158.94.208.168/files/5900855435/eNLe4nm.exe
http://158.94.208.168/files/8531638373/QWFfVk7.exe
http://158.94.208.168/files/7782139129/S6xWuZ1.exe
http://158.94.208.168/files/8574065846/HPlEReH.exe
http://158.94.208.168/files/8434554557/X8cqVrA.exe
http://158.94.208.168/files/gop/random.exe
http://158.94.208.168/files/unique5/random.exe
http://158.94.208.168/vidar/random.exe
http://185.222.160.157/files/8434554557/X8cqVrA.exe
http://185.222.160.157/files/7453936223/KAQ8PQ5.exe
http://185.222.160.157/files/5900855435/eNLe4nm.exe
http://185.222.160.157/files/7782139129/S6xWuZ1.exe
http://185.222.160.157/files/8574065846/HPlEReH.exe
http://185.222.160.157/files/8531638373/QWFfVk7.exe
http://185.222.160.157/files/unique5/random.exe
http://185.222.160.157/files/rdx/random.exe
http://185.222.160.157/files/gop/random.exe
http://185.222.160.157/vidar/random.exe
http://5.252.21.239/vidar/random.exe
http://5.252.21.239/files/rdx/random.exe
http://5.252.21.239/files/7453936223/KAQ8PQ5.exe
http://5.252.21.239/files/8531638373/QWFfVk7.exe
http://5.252.21.239/files/7782139129/S6xWuZ1.exe

Source: URLhaus (abuse.ch). Updated: 2026-04-18

Hosting Infrastructure

Host URLs
dl.armour-inc-down.net 11
158.94.208.168 11
185.222.160.157 10
5.252.21.239 10
192.177.26.196 6
mybiggestjoy.bond 3
158.94.208.7 3
158.94.210.248 2
brukva.shop 2
mygoodblog.bond 2
myverifyblog.sbs 2
cloudflare-check.cfd 2
bigboysclub.cyou 2
productionmaza.cfd 2
allplanetssame.cfd 2
productionmaza.cyou 2
mrazotalog.lol 2
myverifhouse.sbs 2
denegnet.click 2
diddyparty.click 2