user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat PWS:Win64/Vidar.CH!MTB
PWS:Win64/Vidar.CH!MTB - Windows Defender threat signature analysis

PWS:Win64/Vidar.CH!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: PWS:Win64/Vidar.CH!MTB
Classification:
Type:PWS
Platform:Win64
Family:Vidar
Detection Type:Concrete
Known malware family with identified signatures
Variant:CH
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Password Stealer - Steals credentials and sensitive information for 64-bit Windows platform, family Vidar

Summary:

PWS:Win64/Vidar.CH!MTB is a detection for the Vidar information-stealing malware. This threat is designed to steal sensitive data such as browser credentials, cryptocurrency wallets, and system information, which it then exfiltrates to a remote command-and-control server.

Severity:
Medium
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: SecuriteInfo.com.Trojan.PWS.Steam.38543.8568.14741
718363de3fe6afa820c181f5797d006a0f2c5ccc0acb4b5515ab03b77c28a39c
20/11/2025
06b49b2d522767addec65abdcbd925a3a1ef91c2411fcc7bb7ede9003b695935
19/11/2025
27a72161b39b0df878b3df9324efa05151346424dc7303c5fef2bcec55e6cb8c
19/11/2025
34ef41ac4d4c6f5065e95e59afe2698604fccab401a67b49ca181e3265f526b4
18/11/2025
6e16ae3826675bb41a5e10679de9b6c9bd6e052098aae038a8b3b7ffc637070f
14/11/2025
Remediation Steps:
Isolate the device from the network immediately. Run a full antivirus scan to remove the threat. Change all passwords for accounts accessed from this device and monitor for fraudulent activity. For full remediation, consider re-imaging the system from a known-good backup.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 13/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$