Akira: Undetectable Stealer Unleashed

This image is about Akira, an undetectable stealer.

Introduction

A new Stealer named Akira has been put up for sale on Telegram. It has the following features:

  • Password grabber
  • Cookies grabber
  • Bookmarks grabber
  • Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 MetaMask, and MOST OF THE LESS IMPORTANT ONES!)
  • Credit cards grabber
  • Desktop screenshot
  • Telegram stealer
  • Discord token grabber
  • Bypasses all the antiviruses, including Windows Defender

 

It has a Web Interface to generate a new binary.

Akira Stealer

Akira Stealer has been written using Python and compiled using Pyinstaller, which is why its size is quite large. Additionally, it has very low detection on Virustotal.

It uses Telegram as its command and control server. You can also upload the stolen data to GoFile and download it from there.

More posts

This image is about monthly vulnerabilities for September 2024.
This image is about the ServiceNow data leak.
This image is about monthly vulnerabilities for July 2024.
This image is about cyber strategies for the Paris Olympics 2024.
This image is about Russian influence operations targeting the Paris Olympics 2024.
advanced divider

Share this article

Found it interesting? Don’t hesitate to share it to wow your friends or colleagues
advanced divider
Subscribe to our blog newsletter to follow the latest posts