ThreatMon Blog
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy
No Result
View All Result
ThreatMon Blog
No Result
View All Result

Home ยป Akira: Undetectable Stealer Unleashed

Akira: Undetectable Stealer Unleashed

A budget tells us what we can't afford, but it doesn't keep us from buying it.

ibrahim mestav by ibrahim mestav
September 12, 2023
in General
0
akira-undetectable-stealer-unleashed
602
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Introduction

A new Stealer named Akira has been put up for sale on Telegram. It has the following features:

  • Password grabber
  • Cookies grabber
  • Bookmarks grabber
  • Crypto wallets and 2fa extensions dump (Grabs ๐Ÿ’ธ Zcash, ๐Ÿš€ Armory, ๐Ÿ“€ Bytecoin, ๐Ÿ’ต Jaxx, ๐Ÿ’Ž Exodus desktop/extension, ๐Ÿ“‰ Ethereum, ๐Ÿ”จ Electrum, ๐Ÿ•น AtomicWallet, ๐Ÿ’น Guarda, โšก๏ธ Coinbase, ๐ŸฆŠ MetaMask, and MOST OF THE LESS IMPORTANT ONES!)
  • Credit cards grabber
  • Desktop screenshot
  • Telegram stealer
  • Discord token grabber
  • Bypasses all the antiviruses, including Windows Defender.
sale-on-telegram
Figure 1 – Sale on Telegram

It has a Web Interface to generate a new binary.

web-interface
Figure 2 – Web Interface
stealer-builder
Figure 3 – Stealer Builder

Akira Stealer

Akira Stealer has been written using Python and compiled using Pyinstaller, which is why its size is quite large. Additionally, it has very low detection on Virustotal.

low-detection-on-virusotal
Figure 4 – Low detection on Virusotal

It uses Telegram as its command and control server. You can also upload the stolen data to GoFile and download it from there.

telegram-c2
Figure 5 – Telegram C2
Previous Post

ChatGPT and Malware Analysis – ThreatMon

Next Post

The Importance of Attack Surface Management for Organizations

Next Post
the-importance-of-attack-surface-management-for-organizations

The Importance of Attack Surface Management for Organizations

Recommended

phishing-attack-targeting-turkish-companies

Phishing Attack Targeting Turkish Companies

September 12, 2023
nobelium-apt29-envyscout

NOBELIUM APT29 โ€“ EnvyScout

September 7, 2023

Popular Story

  • chatgpt-and-malware-analysis-threatmon

    ChatGPT and Malware Analysis – ThreatMon

    977 shares
    Share 391 Tweet 244
  • ChatGPT and Cyber Security in 15 Questions: Impacts, Benefits and Harms

    777 shares
    Share 311 Tweet 194
  • TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

    751 shares
    Share 300 Tweet 188
  • What is SMTP Open Mail Relay Vulnerability?

    728 shares
    Share 291 Tweet 182
  • The Importance of Attack Surface Management for Organizations

    678 shares
    Share 271 Tweet 170

Intelligence Modules

Cyber Threat Intelligence Attack Surface Management Digital Risk Protection

Resources

Blog Reports

Platform

Discover the platform

Company

About Us Terms & Use Privacy Policy

Blog

The Importance of Attack Surface Management for Organizations ChatGPT and Malware Analysis โ€“ ThreatMon TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files
threatmon-logo

Copyright ยฉ 2023

No Result
View All Result
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Advanced Threat Intelligence Platform
Get 30 Days Free Trial
Get 30 Days Free Trial