Vidar - Daily Threat Report

Saturday, April 18, 2026

Daily Summary

Vidar activity shows a significant surge today, with 16 new samples representing a 47% increase over the 7-day average of 11. This rise is accompanied by a substantial expansion of command and control infrastructure.

New Samples Detected

Executables (.exe) continue to dominate, comprising 75% of today’s samples. The presence of a .lnk file and a .zip archive suggests ongoing use of shortcut files and compressed packages to initiate infection chains, consistent with common initial access vectors.

Distribution Methods

The file type distribution points to continued reliance on phishing campaigns delivering malicious attachments or links. The .lnk file is particularly indicative of campaigns abusing Windows shortcut files, often distributed via email or compromised websites to download and execute the final payload.

Detection Rate

Current Vidar variants demonstrate moderate detection rates by aggregate AV engines. However, the volume of new infrastructure indicates active development, and the .dll samples may represent newer loaders or components that could have lower initial detection scores, posing a short-term evasion risk.

C2 Infrastructure

A notable spike in infrastructure was observed with 100 new C2 servers registered. This large-scale deployment suggests actors are preparing for or actively supporting a widespread campaign, rapidly cycling through domains and IPs to maintain resilience against takedowns.

7-Day Trend

Today’s spike in both samples and infrastructure breaks a period of relatively steady activity observed over the past week, indicating a potential new campaign or a major update to the malware’s deployment.

Security Analysis

The simultaneous surge in samples and C2 servers, while sample count remains in the teens, suggests a shift towards a more distributed, resilient infrastructure model rather than a sheer volume increase in infections. This could indicate preparation for more targeted attacks or an effort to dilute defensive blocking efforts. Defensive teams should prioritize network-based detection for this family, given the high volume of new C2 domains. Implementing or reviewing DNS sinkholing and network traffic analysis rules for anomalous connections to newly registered domains is a recommended immediate action.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)