Akira: Undetectable Stealer Unleashed

This image is about Akira, an undetectable stealer.

Introduction

A new Stealer named Akira has been put up for sale on Telegram. It has the following features:

  • Password grabber
  • Cookies grabber
  • Bookmarks grabber
  • Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 MetaMask, and MOST OF THE LESS IMPORTANT ONES!)
  • Credit cards grabber
  • Desktop screenshot
  • Telegram stealer
  • Discord token grabber
  • Bypasses all the antiviruses, including Windows Defender

Akira

It has a Web Interface to generate a new binary.

stealer crypter

Akira is an information-stealing malware

Akira Stealer

Akira Stealer has been written using Python and compiled using Pyinstaller, which is why its size is quite large. Additionally, it has very low detection on Virustotal.

Akira Stealer

It uses Telegram as its command and control server. You can also upload the stolen data to GoFile and download it from there.

Akira Stealer telegram

More posts

This image is about multiple Nginx vulnerabilities.
This image is about multiple Microsoft IIS vulnerabilities.
This image is about SMTP open mail relay vulnerability.
SSL Expire" means an SSL certificate has expired, causing security warnings for site visitors.
What is Server Header Information Disclosure?
advanced divider

Share this article

Found it interesting? Don’t hesitate to share it to wow your friends or colleagues
advanced divider
Subscribe to our blog newsletter to follow the latest posts