Akira: Undetectable Stealer Unleashed

This image is about Akira, an undetectable stealer.

Introduction

A new Stealer named Akira has been put up for sale on Telegram. It has the following features:

  • Password grabber
  • Cookies grabber
  • Bookmarks grabber
  • Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 MetaMask, and MOST OF THE LESS IMPORTANT ONES!)
  • Credit cards grabber
  • Desktop screenshot
  • Telegram stealer
  • Discord token grabber
  • Bypasses all the antiviruses, including Windows Defender.
sale-on-telegram
Figure 1 – Sale on Telegram

It has a Web Interface to generate a new binary.

web-interface
Figure 2 – Web Interface
stealer-builder
Figure 3 – Stealer Builder

Akira Stealer

Akira Stealer has been written using Python and compiled using Pyinstaller, which is why its size is quite large. Additionally, it has very low detection on Virustotal.

low-detection-on-virusotal
Figure 4 – Low detection on Virusotal

It uses Telegram as its command and control server. You can also upload the stolen data to GoFile and download it from there.

telegram-c2
Figure 5 – Telegram C2

More posts

This image is about monthly vulnerabilities for September 2024.
This image is about the ServiceNow data leak.
This image is about monthly vulnerabilities for July 2024.
This image is about cyber strategies for the Paris Olympics 2024.
This image is about Russian influence operations targeting the Paris Olympics 2024.
advanced divider

Share this article

Found it interesting? Don’t hesitate to share it to wow your friends or colleagues
advanced divider
Subscribe to our blog newsletter to follow the latest posts