Ip stealer

Author: a | 2025-04-24

★★★★☆ (4.6 / 2377 reviews)

Download grammarly

This is a ip stealer written in python - developers15/Ip-stealer-python IP Logger that uses discord's Open Original feature to steal IP's. ip ip-stealer image-logger discord-image-logger discord-image-stealer discord-image-grabber discord-ip-stealer Updated

hansoft git integration

TELLING IP STEALERS THEIR ADRESS ON

BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations. BLX Stealer is actively promoted on platforms like Telegram and Discord and comes in both free and premium versions. This blog post demonstrates how to detect and respond to BLX stealer on an infected Windows endpoint with Wazuh.Behavioral analysis of BLX stealerUpon infecting an endpoint, BLX stealer exhibits the following behaviors:The malware creates a PowerShell script temp.ps1 in the working directory.It starts a command prompt and runs a command that executes the previously created PowerShell script:C:\Windows\system32\cmd.exe /d /s /c “powershell.exe -ExecutionPolicy Bypass -File “Triggers Csc.exe and Cvtres.exe which are both legitimate Microsoft utilities that BLX abuses to compile and manipulate executable files.It executes the decrypted_executable file which is dropped in the %TeMP% folder and the users’ %Startup% folder to ensure persistence.It attempts to discover the victim’s IP and Geolocation details by querying api.ipify.org and geolocation-db.com.Analyzed malware sampleHash algorithmValueMD555bd26a6b610fc1748d0ea905a13f4f0SHA2568c4daf5e4ced10c3b7fd7c17c7c75a158f08867aeb6bccab6da116affa424a89InfrastructureWe use the following infrastructure to demonstrate the detection of BLX Stealer with Wazuh:A pre-built ready-to-use Wazuh OVA 4.9.2. Follow this guide to download the virtual machine.A Windows 11 victim endpoint with Wazuh agent 4.9.2 installed and enrolled to the Wazuh server. Refer to the installation guide for installing the Wazuh agent. We use the following techniques to detect the BLX Stealer on the infected Windows endpoint:Creating custom detection rules to detect BLX Stealer activities.Using a YARA integration to scan and remove files with malicious patterns.Creating detection rulesWe use Sysmon to monitor critical system events on Windows endpoints, such as process creation, file modifications, registry changes, network connections, and script executions. These events are correlated with custom rules on the Wazuh server to detect malicious behaviors specific to BLX Stealer activities.Windows endpointPerform the following steps to configure the Wazuh agent to capture and send Sysmon logs to the Wazuh server for analysis.1. Download Sysmon from the Microsoft Sysinternals page.2. Using Powershell with administrator privilege, create a Sysmon folder in the endpoint C:\ folder:> New-Item -ItemType Directory -Path C:\Sysmon3. Extract the compressed Sysmon file to the folder created above C:\Sysmon:> Expand-Archive -Path "\Sysmon.zip" -DestinationPath "C:\Sysmon"Replace with the path where Sysmon.zip was downloaded.4. Download the Sysmon configuration file – sysmonconfig.xml to C:\Sysmon using the Powershell command below:> wget -Uri -OutFile C:\Sysmon\sysmonconfig.xml5. Switch to the directory with the Sysmon executable and run the command below to install and start Sysmon using PowerShell with administrator privileges: > cd C:\Sysmon > .\Sysmon64.exe -accepteula -i sysmonconfig.xml6. Add the following configuration within the block of the C:\Program Files (x86)\ossec-agent\ossec.conf file: Microsoft-Windows-Sysmon/Operational

here:http://uploadsnack.com/mgkrju

unreliablecode/PHP-IP-Stealer - GitHub

By Madalynn Carr Report LokiBot is an Information Stealer with expanding capabilities depending on the threat actor. This malware family was originally written in C++ and targets Windows devices. LokiBot was first advertised in 2015 on underground markets in Eastern Europe, however it was not common to see it in the wild until 2018. Since then, LokiBot has remained in the top five malware families delivered through phishing emails.HistoryLokiBot first surfaced in March of 2015 on underground hacking forums by a hacker with an alias of “lokistov”, who is also known as “Carter”. This can be seen in Figure 1, where LokiBot was originally posted on an underground form. LokiBot was originally advertised as a “Resident Loader and Password and CryptoCoin-wallet stealer.” It is assumed that lokistov is from a non-English speaking country, specifically an ex-USSR country. LokiBot was being sold for upwards of $450 USD or $540 USD in the current economy this report was written, depending on whether the buyer wanted the stealer or the loader, as well as other add-ons such as a change in the C2 (Command and Control) IP address. After release, every week lokistov would publish an update until 2017, when lokistov released LokiBot V2. Since then, they have not updated the forums for LokiBot V1. Shortly after, the LokiBot source code was leaked around 2018 and is now being sold on forums for as low as $80 USD. There are two theories of how this happened. One is that somebody reversed the original LokiBot and gathered the source code, then published the cracked version of the malware. The other theory is that lokistov got hacked themselves, and the hacker published the stolen version. Figure 1: Original Posting of LokiBot by Lokistov. LokiBot became a popular malware choice for threat actors due to the

THERE'S AN IP STEALER : r/GorillaTag - Reddit

URL. Executing the LNK file triggers a series of scripts, PowerShell, JavaScript, and batch scripts, that download and execute a Python payload. This payload is responsible for deploying multiple malware families, including AsyncRAT, Venom RAT, and XWorm.Technical Characteristics of AsyncRATAllows attackers to execute commands, monitor user activity, and manage files on the compromised system.Capable of stealing sensitive information, including credentials and personal data.Employs techniques to maintain long-term access, such as modifying system registries and utilizing startup folders.Uses obfuscation and encryption to evade detection by security solutions.Inside ANY.RUN's analysis session, we can open the MalConf section to reveal the malicious configurations used by AsyncRAT.View AsyncRAT analysis sessionMalicious configurations analyzed inside controlled environmentAs we can see, AsyncRAT connects to masterpoldo02[.]kozow[.]com over port 7575, allowing remote attackers to control infected machines. Blocking this domain and monitoring traffic to this port can help prevent infections.Besides, AsyncRAT installs itself in %AppData% to blend in with legitimate applications and uses a mutex (AsyncMutex_alosh) to prevent multiple instances from running.The malware also uses AES encryption with a hardcoded key and salt, making it difficult for security tools to analyze its communications.AES encryption used by AsyncRATLumma Stealer: GitHub-Based Distribution In early 2025, cybersecurity experts uncovered a sophisticated campaign involving Lumma Stealer, an information-stealing malware. Attackers used GitHub's release infrastructure to distribute this malware, exploiting the platform's trustworthiness to bypass security measures. Once executed, Lumma Stealer initiates additional malicious activities, including downloading and running other threats like SectopRAT, Vidar, Cobeacon, and additional Lumma Stealer variants.Technical Characteristics of Lumma StealerDistributed through GitHub releases, leveraging trusted infrastructure to evade security detection.Steals browser credentials, cookies, cryptocurrency wallets, and system information.Sends stolen data to remote servers, enabling real-time exfiltration.Can download and execute additional malware, including SectopRAT, Vidar, and Cobeacon.Uses registry modifications and startup entries to maintain access.Detectable through network-based security monitoring tools, revealing. This is a ip stealer written in python - developers15/Ip-stealer-python

This is a ip stealer written in python - GitHub

Why can't I install Face Swap - Face Stealer?The installation of Face Swap - Face Stealer may fail because of the lack of device storage, poor network connection, or the compatibility of your Android device. Therefore, please check the minimum requirements first to make sure Face Swap - Face Stealer is compatible with your phone.How to download Face Swap - Face Stealer old versions?APKPure provides the latest version and all the older versions of Face Swap - Face Stealer. You can download any version you want from here: All Versions of Face Swap - Face StealerWhat's the file size of Face Swap - Face Stealer?Face Swap - Face Stealer takes up around 29.8 MB of storage. It's recommended to download APKPure App to install Face Swap - Face Stealer successfully on your mobile device with faster speed.What language does Face Swap - Face Stealer support?Face Swap - Face Stealer supports isiZulu,中文,Việt Nam, and more languages. Go to More Info to know all the languages Face Swap - Face Stealer supports.

IP Stealer - Get Any IP - All Net Tools

A variant of the Epsilon Stealer, indicating that the Iluria Stealer is also an indirect variant of the Epsilon Stealer/SonicGlyde.Recent DevelopmentOn May 11, 2024, “Ykg,” who claimed to be the developer of Iluria Stealer, announced version 2 of the Iluria Stealer with various subscription plans available.EXTERNAL THREAT LANDSCAPE MANAGEMENTThe Nikki Stealer channel has transitioned to Iluria Stealer. Their Discord channel has a strong user base of Portuguese speakers. The owner of Iluria Stealer, ‘Ykg’, is the former CEO of Nikki Stealer, as claimed in his Discord bio.While investigating his YouTube channel, we discovered another website registered with Hostinger, which is similar to the nikkistealer[.]shop.The developer transformed the Nikki Stealer discord channel into the Iluria Stealer channel and began promoting it. He also created a new Telegram channel for this purpose, which currently has 21 users (albeit no activity).List of IOCsNo.Indicator (SHA-256)Remarks1b66ce85c6942855970fe939a31459e5b7489e6d2c4bbe0d9d89cb8a863082e1cIluria Stealer2api[.]nikkistealer[.]shopDomain3Badgeshop[.]siteDomain4865d5423ec49f96d005cb0b1561a966d8b66f3f2fec7f10a8738d97ffb711990Similar Malware58681456f3f5829f67a2d429b7095715b1b65a7be1aa5e90b9ec5945aa22a099bSimilar MalwareMITRE ATT&CK TTPsNo.TacticsTechnique1Execution (TA0002)T1047: Windows Management Instrumentation T1059: Command and Scripting Interpreter2Persistence (TA0003)T1547.001: Registry Run Keys / Startup FolderT1574.002: DLL Side-Loading3Privilege Escalation (TA0004)T1055: Process Injection T1547.001: Registry Run Keys / Startup Folder4Defense Evasion (TA0005)T1036: MasqueradingT1055: Process InjectionT1574.002: DLL Side-Loading6Discovery (TA0007)T1012: Query Registry T1057: Process Discovery T1018: Remote System Discovery T1082: System Information Discovery7Collection (TA0009)T1114: Email Collection8Command and Control (TA0011)T1573: Encrypted Channel T1071: Application Layer ProtocolCONCLUSIONIn summary, the Nikki Stealer group has now become the Iluria Stealer, and while their Discord channel is full of Portuguese speakers, both of their websites are hosted by Hostinger. The owner claims to be the former CEO of Nikki Stealer in their

GabryB03/Omegle-Videochat-IP-Stealer - GitHub

What kind of malware is ScarletStealer?ScarletStealer (Scarlet Stealer) is a piece of malicious software designed to steal information from infected devices. As of the time of writing, this stealer is an unsophisticated malware.The core of ScarletStealer's functionality depends on the additional components that it downloads/installs. This stealer has been used in campaigns targeting users located in the North and South Americas, South and Southeast Asia, North and South Africa, and Europe.ScarletStealer malware overviewScarletStealer infiltrates systems through a complex chain comprising multiple downloaders; the last one is called Penguish. Although chains of this kind are typically used to introduce likewise sophisticated malware into devices, ScarletStealer is not such a program.This stealer is poorly constructed and contains redundant code and flaws. For example, the program fails to set itself to start automatically upon each system reboot, which is part of its persistence-ensuring protocol. This could suggest that the malware is still in development.The purpose of this program is to extract and exfiltrate vulnerable data from devices. Following successful infiltration, ScarletStealer checks for installed cryptocurrency wallets by searching for specific folder paths ("%APPDATA%\Roaming\[crypto_name/wallet_name]", etc.).This stealer relies on other programs and browser extensions to fulfill its data-stealing purpose. Hence, if something of interest is detected, the program executes a PowerShell command to download/install the appropriate software/component.ScarletStealer was observed injecting "meta.exe" to modify the Google Chrome browser shortcut. Thus, the browser is run with a malicious extension(s). Another known addition is "metaver_.exe", which steals information from installed Chrome extensions.It must be mentioned that malware developers often improve upon their creations and methodologies. Therefore, it is not unlikely that ScarletStealer's developers will continue updating this stealer by streamlining it and adding different components or features.To summarize, the presence of software like ScarletStealer on devices can lead to severe privacy issues, financial losses, and identity theft.Threat Summary:NameScarletStealer virusThreat TypeTrojan, password-stealing virus, stealer.Detection NamesAvast (Win64:AdwareX-gen [Adw]), Combo Cleaner (Application.Generic.3608936), DrWeb (Trojan.PWS.Stealer.38504), Kaspersky (Trojan-Banker.Win64.CryptoSwap.b), Microsoft (Trojan:Win64/ScarletFlash!MSR), Full List Of Detections (VirusTotal)SymptomsTrojans are designed to stealthily infiltrate the victim's computer and remain silent, and thus no particular symptoms are clearly visible on an infected machine.Distribution methodsInfected email attachments, malicious online advertisements, social engineering, software 'cracks'.DamageStolen passwords and banking information, identity theft, the victim's computer added to a botnet.Malware Removal (Windows)To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.▼ Download Combo Cleaner To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.Stealer-type malware examplesWe have written about countless malicious programs; Acrid, CoinLurker, JarkaStealer, PXA, Glove, and Muck are merely some of our latest articles on stealers.This type

discord-ip-stealer GitHub Topics GitHub

Published On : 2024-05-23 EXECUTIVE SUMMARYAt CYFIRMA, we are committed to offering up-to-date insights into prevalent threats and tactics employed by malicious actors who target organizations and individuals. The ‘Iluria Stealer’ is a new malware variant created by the same developer behind the Nikki Stealer, who uses the alias ‘Ykg”. Both share similar code with SonicGlyde; a discord stealer, which is a variant of the Epsilon Stealer, which captures browser cookies, credentials, and credit card information saved in Discord. This time, four individuals are managing the Iluria Stealer: Ykg, Noxty, Outlier, and Ness.INTRODUCTIONIn addition to the above, the ‘Iluria Stealer’ is also an NSIS installer that includes an obfuscated Electron app. This app decrypts malicious code during runtime to steal Discord tokens and browser credentials, and in the second stage, downloads a malicious JavaScript file that replaces Discord’s index.js file. This injected file intercepts any account changes, like password and email updates or 2FA activation, and sends this information back to the attacker’s command and control (C2) server.Once a victim’s account is compromised, the hacker uses their account and browser information to either ransom the user or target new victims. They can also search through browser data for other accounts that can be exploited, such as crypto exchanges, and bank accounts.ASSESSMENTFile Namedskadksa-1d7Izx3B5.exeFile Size71.27 MbSignedNot SignedMD5 Hashf13115afbc6c7440771aa8b26daa1494SHA-256 Hashb66ce85c6942855970fe939a31459e5b7489e6d2c4bbe0d9d89cb8a863082e1cFirst Seen in the WildMay 2024At the time of writing this report, VirusTotal shows zero detections for this stealer.The primary executable file i.e. ‘dskadksa-1d7Izx3B5.exe’ is built using the Electron framework, storing its source code. This is a ip stealer written in python - developers15/Ip-stealer-python

proficient connect

IP Stealer v1.3 by Slek SRC - Indetectables

Version History[]Increased Soul Stealer max charges from 20 to 30.Reduced Soul Stealer max charges from 25 to 20.Reduced attack damage bonus from 55 to 50.Added new Soul Stealer passive ability.Gains attack damage every time an enemy hero dies while affected by Corruption.Max charges: 25Charge per kill: 2Attack damage bonus per charge: 1Notes: Works by using item charges. Gains charges whenever a debuff enemy hero dies, no matter how.Reduced attack damage bonus from 60 to 55.Increased attack damage bonus from 50 to 60.Reduced Corruption armor reduction from 7 to 6.Reduced Corruption duration from 15 to 7.Increased Corruption armor reduction from 6 to 7.Reduced Corruption armor reduction from 7 to 6.Reduced attack damage bonus from 60 to 50.Increased Corruption armor reduction from 6 to 7.Increased Corruption duration from 7 to 15.Updated item icon.Increased Corruption duration from 5 to 7.Updated Corruption ability debuff icon.Increased attack damage bonus from 50 to 60.Reduced attack damage bonus from 60 to 50.Increased attack damage bonus from 50 to 60.Increased Corruption armor reduction from 5 to 6.Item cost changes:Reduced Corruption armor reduction from 6 to 5.Reduced attack damage bonus from 55 to 50.No longer grants 7 armor bonus.Increased Corruption armor reduction from 5 to 6.Item cost changes:Increased armor bonus from 5 to 7.No longer grants 50% health regeneration.CreatedPatch History[]Updated Corruption ability descriptions.Updated Soul Stealer ability tooltip.Fixed Desolator to apply its debuff on attack landing, not attack starting — still applies before damage is calculated.Added a ▶️ sound layer to Corruption attacks. Community content is available under CC BY-NC-SA unless otherwise noted.

Ip-stealer-python/stealer.py at main - GitHub

Also compiled into a list categorized by browser type.This function terminates specified processes on a Windows system by obtaining a list of running tasks potentially used for analysis, and then filtering the specified processes to those currently running. ‘taskkill` is used to terminate each one.Discord tokens are unique identifiers that grant access to a user’s account, similar to a username and password combination. Once an attacker steals the token, they can use the Discord API to perform actions on behalf of the victim, including retrieving information about the user’s profile and any Discord servers they are a member of.Additionally, the attacker could use the Discord API to check the permissions and roles assigned to the user within Discord servers, which could reveal the level of access the user has within those servers, such as administrative privileges or moderator roles.The malware appears to be capable of accessing and retrieving payment sources stored within a user’s Discord account in the billing section. This includes sensitive financial information such as credit card details or other payment methods linked to the user’s profile. During dynamic analysis, we executed the stealer in a sandbox environment and found that it attempts to communicate with the domain api[.]nikkistealer[.]shop.The stealer uses this configuration to interact with the specified API, indicating its control server and possibly the unique identifier for the infected user.A WHOIS lookup for the domain `nikkistealer[.]shop` reveals that it is hosted by Hostinger.During further analysis of the code, we also examined another stealer, ‘SonicGlyde’, which is. This is a ip stealer written in python - developers15/Ip-stealer-python IP Logger that uses discord's Open Original feature to steal IP's. ip ip-stealer image-logger discord-image-logger discord-image-stealer discord-image-grabber discord-ip-stealer Updated

TELLING IP STEALERS THEIR ADRESS ON OMEGLE - YouTube

Discord bio, and when we looked at their code, we found out that Iluria Stealer can steal browser passwords, and autofill data and cookies. This group keeps changing and growing, which makes them a serious threat to online security, underlining the importance of staying alert and having strong security measures in place to protect against Iluria Stealer and similar threats.RECOMMENDATIONSStrategic Recommendations:Implement Defense-in-Depth Strategy: Develop a comprehensive defense strategy that combines network segmentation, robust perimeter defenses, and endpoint security to create multiple layers of protection against such threats.Invest in Threat Intelligence: Engage with threat intelligence services to stay informed about the evolving tactics, techniques, and procedures employed by malware operators. Regularly update defenses based on the latest threat intelligence to enhance proactive detection capabilities.Enhance Employee Training: Conduct regular cybersecurity training programs to educate employees about phishing threats, social engineering, and safe browsing practices. Building a security-aware culture can significantly reduce the likelihood of successful infostealer infections.Management Recommendations:Develop an Incident Response Plan: Establish a robust incident response plan that outlines clear procedures for identifying, containing, eradicating, and recovering from an Iluria Stealer infection. Regularly test and update the plan to ensure effectiveness.Conduct Regular Security Audits: Perform periodic security audits to assess the effectiveness of existing security controls, identify potential weaknesses, and validate the organization’s overall security posture. Use the findings to make informed adjustments and improvements.Collaborate with Industry Peers: Engage in information sharing and collaboration with industry peers, cybersecurity communities, and relevant authorities. Sharing threat intelligence and best practices can enhance collective

Comments

User2616

BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations. BLX Stealer is actively promoted on platforms like Telegram and Discord and comes in both free and premium versions. This blog post demonstrates how to detect and respond to BLX stealer on an infected Windows endpoint with Wazuh.Behavioral analysis of BLX stealerUpon infecting an endpoint, BLX stealer exhibits the following behaviors:The malware creates a PowerShell script temp.ps1 in the working directory.It starts a command prompt and runs a command that executes the previously created PowerShell script:C:\Windows\system32\cmd.exe /d /s /c “powershell.exe -ExecutionPolicy Bypass -File “Triggers Csc.exe and Cvtres.exe which are both legitimate Microsoft utilities that BLX abuses to compile and manipulate executable files.It executes the decrypted_executable file which is dropped in the %TeMP% folder and the users’ %Startup% folder to ensure persistence.It attempts to discover the victim’s IP and Geolocation details by querying api.ipify.org and geolocation-db.com.Analyzed malware sampleHash algorithmValueMD555bd26a6b610fc1748d0ea905a13f4f0SHA2568c4daf5e4ced10c3b7fd7c17c7c75a158f08867aeb6bccab6da116affa424a89InfrastructureWe use the following infrastructure to demonstrate the detection of BLX Stealer with Wazuh:A pre-built ready-to-use Wazuh OVA 4.9.2. Follow this guide to download the virtual machine.A Windows 11 victim endpoint with Wazuh agent 4.9.2 installed and enrolled to the Wazuh server. Refer to the installation guide for installing the Wazuh agent. We use the following techniques to detect the BLX Stealer on the infected Windows endpoint:Creating custom detection rules to detect BLX Stealer activities.Using a YARA integration to scan and remove files with malicious patterns.Creating detection rulesWe use Sysmon to monitor critical system events on Windows endpoints, such as process creation, file modifications, registry changes, network connections, and script executions. These events are correlated with custom rules on the Wazuh server to detect malicious behaviors specific to BLX Stealer activities.Windows endpointPerform the following steps to configure the Wazuh agent to capture and send Sysmon logs to the Wazuh server for analysis.1. Download Sysmon from the Microsoft Sysinternals page.2. Using Powershell with administrator privilege, create a Sysmon folder in the endpoint C:\ folder:> New-Item -ItemType Directory -Path C:\Sysmon3. Extract the compressed Sysmon file to the folder created above C:\Sysmon:> Expand-Archive -Path "\Sysmon.zip" -DestinationPath "C:\Sysmon"Replace with the path where Sysmon.zip was downloaded.4. Download the Sysmon configuration file – sysmonconfig.xml to C:\Sysmon using the Powershell command below:> wget -Uri -OutFile C:\Sysmon\sysmonconfig.xml5. Switch to the directory with the Sysmon executable and run the command below to install and start Sysmon using PowerShell with administrator privileges: > cd C:\Sysmon > .\Sysmon64.exe -accepteula -i sysmonconfig.xml6. Add the following configuration within the block of the C:\Program Files (x86)\ossec-agent\ossec.conf file: Microsoft-Windows-Sysmon/Operational

2025-04-05
User2639

By Madalynn Carr Report LokiBot is an Information Stealer with expanding capabilities depending on the threat actor. This malware family was originally written in C++ and targets Windows devices. LokiBot was first advertised in 2015 on underground markets in Eastern Europe, however it was not common to see it in the wild until 2018. Since then, LokiBot has remained in the top five malware families delivered through phishing emails.HistoryLokiBot first surfaced in March of 2015 on underground hacking forums by a hacker with an alias of “lokistov”, who is also known as “Carter”. This can be seen in Figure 1, where LokiBot was originally posted on an underground form. LokiBot was originally advertised as a “Resident Loader and Password and CryptoCoin-wallet stealer.” It is assumed that lokistov is from a non-English speaking country, specifically an ex-USSR country. LokiBot was being sold for upwards of $450 USD or $540 USD in the current economy this report was written, depending on whether the buyer wanted the stealer or the loader, as well as other add-ons such as a change in the C2 (Command and Control) IP address. After release, every week lokistov would publish an update until 2017, when lokistov released LokiBot V2. Since then, they have not updated the forums for LokiBot V1. Shortly after, the LokiBot source code was leaked around 2018 and is now being sold on forums for as low as $80 USD. There are two theories of how this happened. One is that somebody reversed the original LokiBot and gathered the source code, then published the cracked version of the malware. The other theory is that lokistov got hacked themselves, and the hacker published the stolen version. Figure 1: Original Posting of LokiBot by Lokistov. LokiBot became a popular malware choice for threat actors due to the

2025-04-12
User6061

Why can't I install Face Swap - Face Stealer?The installation of Face Swap - Face Stealer may fail because of the lack of device storage, poor network connection, or the compatibility of your Android device. Therefore, please check the minimum requirements first to make sure Face Swap - Face Stealer is compatible with your phone.How to download Face Swap - Face Stealer old versions?APKPure provides the latest version and all the older versions of Face Swap - Face Stealer. You can download any version you want from here: All Versions of Face Swap - Face StealerWhat's the file size of Face Swap - Face Stealer?Face Swap - Face Stealer takes up around 29.8 MB of storage. It's recommended to download APKPure App to install Face Swap - Face Stealer successfully on your mobile device with faster speed.What language does Face Swap - Face Stealer support?Face Swap - Face Stealer supports isiZulu,中文,Việt Nam, and more languages. Go to More Info to know all the languages Face Swap - Face Stealer supports.

2025-03-29
User4032

A variant of the Epsilon Stealer, indicating that the Iluria Stealer is also an indirect variant of the Epsilon Stealer/SonicGlyde.Recent DevelopmentOn May 11, 2024, “Ykg,” who claimed to be the developer of Iluria Stealer, announced version 2 of the Iluria Stealer with various subscription plans available.EXTERNAL THREAT LANDSCAPE MANAGEMENTThe Nikki Stealer channel has transitioned to Iluria Stealer. Their Discord channel has a strong user base of Portuguese speakers. The owner of Iluria Stealer, ‘Ykg’, is the former CEO of Nikki Stealer, as claimed in his Discord bio.While investigating his YouTube channel, we discovered another website registered with Hostinger, which is similar to the nikkistealer[.]shop.The developer transformed the Nikki Stealer discord channel into the Iluria Stealer channel and began promoting it. He also created a new Telegram channel for this purpose, which currently has 21 users (albeit no activity).List of IOCsNo.Indicator (SHA-256)Remarks1b66ce85c6942855970fe939a31459e5b7489e6d2c4bbe0d9d89cb8a863082e1cIluria Stealer2api[.]nikkistealer[.]shopDomain3Badgeshop[.]siteDomain4865d5423ec49f96d005cb0b1561a966d8b66f3f2fec7f10a8738d97ffb711990Similar Malware58681456f3f5829f67a2d429b7095715b1b65a7be1aa5e90b9ec5945aa22a099bSimilar MalwareMITRE ATT&CK TTPsNo.TacticsTechnique1Execution (TA0002)T1047: Windows Management Instrumentation T1059: Command and Scripting Interpreter2Persistence (TA0003)T1547.001: Registry Run Keys / Startup FolderT1574.002: DLL Side-Loading3Privilege Escalation (TA0004)T1055: Process Injection T1547.001: Registry Run Keys / Startup Folder4Defense Evasion (TA0005)T1036: MasqueradingT1055: Process InjectionT1574.002: DLL Side-Loading6Discovery (TA0007)T1012: Query Registry T1057: Process Discovery T1018: Remote System Discovery T1082: System Information Discovery7Collection (TA0009)T1114: Email Collection8Command and Control (TA0011)T1573: Encrypted Channel T1071: Application Layer ProtocolCONCLUSIONIn summary, the Nikki Stealer group has now become the Iluria Stealer, and while their Discord channel is full of Portuguese speakers, both of their websites are hosted by Hostinger. The owner claims to be the former CEO of Nikki Stealer in their

2025-04-02
User8475

Published On : 2024-05-23 EXECUTIVE SUMMARYAt CYFIRMA, we are committed to offering up-to-date insights into prevalent threats and tactics employed by malicious actors who target organizations and individuals. The ‘Iluria Stealer’ is a new malware variant created by the same developer behind the Nikki Stealer, who uses the alias ‘Ykg”. Both share similar code with SonicGlyde; a discord stealer, which is a variant of the Epsilon Stealer, which captures browser cookies, credentials, and credit card information saved in Discord. This time, four individuals are managing the Iluria Stealer: Ykg, Noxty, Outlier, and Ness.INTRODUCTIONIn addition to the above, the ‘Iluria Stealer’ is also an NSIS installer that includes an obfuscated Electron app. This app decrypts malicious code during runtime to steal Discord tokens and browser credentials, and in the second stage, downloads a malicious JavaScript file that replaces Discord’s index.js file. This injected file intercepts any account changes, like password and email updates or 2FA activation, and sends this information back to the attacker’s command and control (C2) server.Once a victim’s account is compromised, the hacker uses their account and browser information to either ransom the user or target new victims. They can also search through browser data for other accounts that can be exploited, such as crypto exchanges, and bank accounts.ASSESSMENTFile Namedskadksa-1d7Izx3B5.exeFile Size71.27 MbSignedNot SignedMD5 Hashf13115afbc6c7440771aa8b26daa1494SHA-256 Hashb66ce85c6942855970fe939a31459e5b7489e6d2c4bbe0d9d89cb8a863082e1cFirst Seen in the WildMay 2024At the time of writing this report, VirusTotal shows zero detections for this stealer.The primary executable file i.e. ‘dskadksa-1d7Izx3B5.exe’ is built using the Electron framework, storing its source code

2025-04-01
User4152

Version History[]Increased Soul Stealer max charges from 20 to 30.Reduced Soul Stealer max charges from 25 to 20.Reduced attack damage bonus from 55 to 50.Added new Soul Stealer passive ability.Gains attack damage every time an enemy hero dies while affected by Corruption.Max charges: 25Charge per kill: 2Attack damage bonus per charge: 1Notes: Works by using item charges. Gains charges whenever a debuff enemy hero dies, no matter how.Reduced attack damage bonus from 60 to 55.Increased attack damage bonus from 50 to 60.Reduced Corruption armor reduction from 7 to 6.Reduced Corruption duration from 15 to 7.Increased Corruption armor reduction from 6 to 7.Reduced Corruption armor reduction from 7 to 6.Reduced attack damage bonus from 60 to 50.Increased Corruption armor reduction from 6 to 7.Increased Corruption duration from 7 to 15.Updated item icon.Increased Corruption duration from 5 to 7.Updated Corruption ability debuff icon.Increased attack damage bonus from 50 to 60.Reduced attack damage bonus from 60 to 50.Increased attack damage bonus from 50 to 60.Increased Corruption armor reduction from 5 to 6.Item cost changes:Reduced Corruption armor reduction from 6 to 5.Reduced attack damage bonus from 55 to 50.No longer grants 7 armor bonus.Increased Corruption armor reduction from 5 to 6.Item cost changes:Increased armor bonus from 5 to 7.No longer grants 50% health regeneration.CreatedPatch History[]Updated Corruption ability descriptions.Updated Soul Stealer ability tooltip.Fixed Desolator to apply its debuff on attack landing, not attack starting — still applies before damage is calculated.Added a ▶️ sound layer to Corruption attacks. Community content is available under CC BY-NC-SA unless otherwise noted.

2025-04-13

Add Comment