Built For & By Cyber Security Professionals
HomeMalwareArkanix Stealer – A Short-Lived but Potent Infostealer
Arkanix Stealer Malware-as-a-Service: Short-Lived but Powerful Infostealer

Arkanix Stealer – A Short-Lived but Potent Infostealer

Spread the word

 

In late 2025, a new malware-as-a-service (MaaS) operation called Arkanix Stealer briefly emerged, offering cybercriminals a powerful toolkit for harvesting sensitive data. Despite lasting only a few months, its capabilities highlight the growing sophistication of infostealers and the SaaS-like models driving cybercrime.

Dual Implementation: C++ and Python

Arkanix Stealer was implemented in both C++ and Python, giving attackers flexibility:

  • C++ Variant: Delivered advanced features like ChromElevator, cryptocurrency wallet theft, and anti-analysis protections using VMProtect.
  • Python Variant: Distributed via PyInstaller or Nuitka, capable of dynamically modifying its configuration through remote GET requests.

Information Theft Capabilities

The stealer targeted a wide range of data sources:

  • System Data: CPU, GPU, RAM, OS, screen, keyboard, time zone.
  • Applications: Antivirus, VPN clients (Mullvad, NordVPN, ExpressVPN, ProtonVPN).
  • Browsers: 22 browsers targeted for history, autofill, passwords, cookies, and OAuth2 tokens.
  • Messaging Apps: Telegram messages and Discord credentials.
  • Files: Exfiltrated from predefined directories, packed into ZIP archives, and sent to C&C servers.

Self-Spreading via Discord

One of the standout features was its self-spreading mechanism:

  • Leveraged the Discord API to collect friends and channels.
  • Sent pre-configured messages to victims’ contacts, propagating infection.

Modular Expansion

Arkanix Stealer could fetch additional modules from its C&C server:

  • Chrome Grabber
  • Wallet Patcher
  • Extra Collector
  • Startup Persistence Script

Business Model: MaaS Infrastructure

The campaign mirrored legitimate SaaS operations:

  • Control Panel: Allowed payload configuration and victim monitoring.
  • Discord Channel: Provided customer support and community interaction.
  • Referral Program: Incentivized new customers.

Campaign Timeline

  • October 2025: Advertised in underground forums.
  • December 2025: Control panel and Discord channel taken down, signaling the end of operations.

Kaspersky concluded that Arkanix Stealer was a one-shot campaign aimed at quick financial gains rather than long-term persistence.

Indicators of Compromise (IOCs) extracted from Kaspersky’s analysis

 

 

File Hashes

  • 752e3eb5a9c295ee285205fb39b67fc4
  • c1e4be64f80bc019651f84ef852dfa6c
  • a8eeda4ae7db3357ed2ee0d94b963eff
  • c0c04df98b7d1ca9e8c08dd1ffbdd16b
  • 88487ab7a666081721e1dd1999fb9fb2
  • d42ba771541893eb047a0e835bd4f84e
  • 5f71b83ca752cb128b67dbb1832205a4
  • 208fa7e01f72a50334f3d7607f6b82bf
  • e27edcdeb44522a9036f5e4cd23f1f0c
  • ea50282fa1269836a7e87eddb10f95f7
  • 643696a052ea1963e24cfb0531169477
  • f5765930205719c2ac9d2e26c3b03d8d
  • 576de7a075637122f47d02d4288e3dd6
  • 7888eb4f51413d9382e2b992b667d9f5
  • 3283f8c54a3ddf0bc0d4111cc1f950c0

Domains & IPs

  • arkanix[.]pw195.246.231[.]60
  • arkanix[.]ru172.67.186[.]193

Notable C2 Endpoints

  • hxxps://arkanix[.]pw/api/session/create
  • hxxps://arkanix[.]pw/stealer.py
  • hxxps://arkanix[.]pw/api/features/{payload_id}
  • hxxps://arkanix[.]pw/upload_dropper.py
  • /delivery (used for exfiltrating Telegram data)
  • /api/chrome-grabber-template/{payload_id}
  • /api/wallet-patcher/{payload_id}
  • /api/extra-collector/{payload_id}
  • /hvnc (HVNC module, placed in Startup folder)

Detection Names (Kaspersky)

  • Trojan-PSW.Win64.Coins.*
  • HEUR:Trojan-PSW.Multi.Disco.gen
  • Trojan.Python.Agent.*

Conclusion

Arkanix Stealer may have been short-lived, but its breadth of capabilities and SaaS-like infrastructure demonstrate how cybercriminals continue to innovate. Monitoring such campaigns is crucial, as they often serve as prototypes for future, more persistent threats.

Follow Us On – X.comTelegram, LinkedIN, Discord Server,

 

For The Latest Updates, Vulnerability Insights, Security News, Cyberattack Scoops And Cybersecurity Best Practices Delivered Straight To Your Inbox – Subscribe To Our Newsletter