Arkanix Stealer targets a variety of data, offers a MaaS referral program
Arkanix Stealer, a newly discovered malware operating under a Malware-as-a-Service model, targets a wide range of user data including cryptocurrencies, gaming, and online banking information. The stealer, available in both Python and C++ versions, offers configurable features and employs various techniques to evade detection. It can extract data from multiple browsers, VPNs, and gaming platforms, as well as capture screenshots and RDP connection details. The malware authors promoted their product through a Discord server and implemented a referral program to attract customers. The campaign appears to have been short-lived, with infrastructure taken down around December 2025.
AI Analysis
Technical Summary
Arkanix Stealer is a recently identified malware operating under a Malware-as-a-Service (MaaS) model, designed to steal a wide variety of sensitive user data. It targets cryptocurrency wallets, gaming accounts, online banking credentials, and browser-stored information by extracting data from multiple browsers, VPN clients, and gaming platforms. The malware is available in both Python and C++ versions, allowing flexibility and adaptability for its operators and affiliates. It employs various evasion techniques such as obfuscation and anti-detection methods to avoid security software detection. Additionally, it can capture screenshots and gather Remote Desktop Protocol (RDP) connection details, expanding its data theft capabilities. The operators used Discord as a marketing platform and implemented a referral program to encourage wider distribution and affiliate recruitment. Despite the campaign being short-lived with infrastructure takedown around December 2025, the malware demonstrates a sophisticated approach to data theft and distribution. The lack of known exploits in the wild suggests it may still be emerging or limited in scope, but its modular design and MaaS model indicate potential for rapid resurgence or adaptation. The malware’s tactics align with several MITRE ATT&CK techniques including credential access, data from local system, command and control, and defense evasion, highlighting its comprehensive threat profile.
Potential Impact
The Arkanix Stealer poses significant risks to individuals and organizations by compromising confidentiality of sensitive data such as cryptocurrency wallets, banking credentials, and gaming accounts. Theft of such data can lead to direct financial losses, unauthorized transactions, and identity theft. The capture of RDP connection details can facilitate further lateral movement or unauthorized remote access within enterprise environments, potentially escalating the impact. The malware’s ability to evade detection increases the likelihood of prolonged undetected presence, exacerbating damage. Organizations with employees using VPNs, remote desktop tools, or involved in gaming or cryptocurrency activities are at heightened risk. The MaaS model lowers the barrier for cybercriminals to deploy this malware, potentially increasing its spread and impact. Although the campaign was short-lived, the modular and configurable nature of the malware means it could be repurposed or reintroduced, posing ongoing threats. The impact extends beyond individual users to enterprises that rely on remote access and handle sensitive financial data, making it a multi-sector concern.
Mitigation Recommendations
To mitigate the threat posed by Arkanix Stealer, organizations should implement multi-layered defenses tailored to the malware’s capabilities. First, enforce strict endpoint protection with advanced behavioral detection capable of identifying obfuscated or polymorphic malware variants in both Python and C++. Regularly update and patch all software, especially browsers, VPN clients, and remote desktop tools, to reduce exploitation vectors. Employ network segmentation and restrict RDP access using VPNs with multi-factor authentication (MFA) and strong password policies to limit lateral movement opportunities. Monitor for unusual outbound traffic patterns indicative of data exfiltration or command and control communications. Conduct user awareness training focused on phishing and social engineering tactics that could deliver the malware payload. Disable or restrict execution of unauthorized scripts and binaries, particularly Python scripts, using application control policies. Utilize threat intelligence feeds to detect indicators of compromise related to Arkanix Stealer and proactively hunt for signs of infection. Finally, consider deploying endpoint detection and response (EDR) solutions to enable rapid detection and remediation of infections.
Affected Countries
United States, Russia, China, Germany, United Kingdom, South Korea, Japan, Canada, Australia, Brazil
Indicators of Compromise
- hash: 208fa7e01f72a50334f3d7607f6b82bf
- hash: 3283f8c54a3ddf0bc0d4111cc1f950c0
- hash: 576de7a075637122f47d02d4288e3dd6
- hash: 5f71b83ca752cb128b67dbb1832205a4
- hash: 643696a052ea1963e24cfb0531169477
- hash: 752e3eb5a9c295ee285205fb39b67fc4
- hash: 7888eb4f51413d9382e2b992b667d9f5
- hash: 88487ab7a666081721e1dd1999fb9fb2
- hash: a3fc46332dcd0a95e336f6927bae8bb7
- hash: a8eeda4ae7db3357ed2ee0d94b963eff
- hash: af8fd03c1ec81811acf16d4182f3b5e1
- hash: c0c04df98b7d1ca9e8c08dd1ffbdd16b
- hash: c1e4be64f80bc019651f84ef852dfa6c
- hash: d42ba771541893eb047a0e835bd4f84e
- hash: e27edcdeb44522a9036f5e4cd23f1f0c
- hash: ea50282fa1269836a7e87eddb10f95f7
- hash: f5765930205719c2ac9d2e26c3b03d8d
- hash: 13c11692bfe44acc5b43b0fdd00acbff905cf50e
- hash: 41fe944afb515ea5dbf771fc4d87726d4b7937f0
- hash: 49c43e4104e308eb8ab6435e528c7a94f8de22c7
- hash: 5a7aa24c9165052e3343946472985ed4e3f559ff
- hash: c4c0ac50f702a62ef97e42a48dde3e362884d7e7
- hash: e6d84f455a2771259e613dadf297eb7b11b2fd6129bf1b432e7308ad70e06d0e
- hash: e7ea07553eb80ba6b6b7120e883c9c2eea37d2d821b8a84f74c8dc5539f6bc1d
- hash: eaa8636abb0ed6d29c1622a5df624fb0a961c7efb86f2efe3e63271b2cf7a1cc
- hash: ec74ae56c8220a885b0b20b44bc458752798b4c67412f6b3ca70edfd37e9632a
- hash: ec8da71984ac0a6b13881ec4b1d7ebd2c1c59a84cf580958c9ca71b25943ba75
- ip: 195.246.231.60
- url: https://arkanix.pw/api/features/
- url: https://arkanix.pw/api/session/create
- url: https://arkanix.pw/stealer.py
- url: https://arkanix.pw/upload_dropper.py
- domain: arkanix.pw
- domain: arkanix.ru
Arkanix Stealer targets a variety of data, offers a MaaS referral program
Description
Arkanix Stealer, a newly discovered malware operating under a Malware-as-a-Service model, targets a wide range of user data including cryptocurrencies, gaming, and online banking information. The stealer, available in both Python and C++ versions, offers configurable features and employs various techniques to evade detection. It can extract data from multiple browsers, VPNs, and gaming platforms, as well as capture screenshots and RDP connection details. The malware authors promoted their product through a Discord server and implemented a referral program to attract customers. The campaign appears to have been short-lived, with infrastructure taken down around December 2025.
AI-Powered Analysis
Technical Analysis
Arkanix Stealer is a recently identified malware operating under a Malware-as-a-Service (MaaS) model, designed to steal a wide variety of sensitive user data. It targets cryptocurrency wallets, gaming accounts, online banking credentials, and browser-stored information by extracting data from multiple browsers, VPN clients, and gaming platforms. The malware is available in both Python and C++ versions, allowing flexibility and adaptability for its operators and affiliates. It employs various evasion techniques such as obfuscation and anti-detection methods to avoid security software detection. Additionally, it can capture screenshots and gather Remote Desktop Protocol (RDP) connection details, expanding its data theft capabilities. The operators used Discord as a marketing platform and implemented a referral program to encourage wider distribution and affiliate recruitment. Despite the campaign being short-lived with infrastructure takedown around December 2025, the malware demonstrates a sophisticated approach to data theft and distribution. The lack of known exploits in the wild suggests it may still be emerging or limited in scope, but its modular design and MaaS model indicate potential for rapid resurgence or adaptation. The malware’s tactics align with several MITRE ATT&CK techniques including credential access, data from local system, command and control, and defense evasion, highlighting its comprehensive threat profile.
Potential Impact
The Arkanix Stealer poses significant risks to individuals and organizations by compromising confidentiality of sensitive data such as cryptocurrency wallets, banking credentials, and gaming accounts. Theft of such data can lead to direct financial losses, unauthorized transactions, and identity theft. The capture of RDP connection details can facilitate further lateral movement or unauthorized remote access within enterprise environments, potentially escalating the impact. The malware’s ability to evade detection increases the likelihood of prolonged undetected presence, exacerbating damage. Organizations with employees using VPNs, remote desktop tools, or involved in gaming or cryptocurrency activities are at heightened risk. The MaaS model lowers the barrier for cybercriminals to deploy this malware, potentially increasing its spread and impact. Although the campaign was short-lived, the modular and configurable nature of the malware means it could be repurposed or reintroduced, posing ongoing threats. The impact extends beyond individual users to enterprises that rely on remote access and handle sensitive financial data, making it a multi-sector concern.
Mitigation Recommendations
To mitigate the threat posed by Arkanix Stealer, organizations should implement multi-layered defenses tailored to the malware’s capabilities. First, enforce strict endpoint protection with advanced behavioral detection capable of identifying obfuscated or polymorphic malware variants in both Python and C++. Regularly update and patch all software, especially browsers, VPN clients, and remote desktop tools, to reduce exploitation vectors. Employ network segmentation and restrict RDP access using VPNs with multi-factor authentication (MFA) and strong password policies to limit lateral movement opportunities. Monitor for unusual outbound traffic patterns indicative of data exfiltration or command and control communications. Conduct user awareness training focused on phishing and social engineering tactics that could deliver the malware payload. Disable or restrict execution of unauthorized scripts and binaries, particularly Python scripts, using application control policies. Utilize threat intelligence feeds to detect indicators of compromise related to Arkanix Stealer and proactively hunt for signs of infection. Finally, consider deploying endpoint detection and response (EDR) solutions to enable rapid detection and remediation of infections.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/arkanix-stealer/119006/"]
- Adversary
- null
- Pulse Id
- 6996efa6979db417fed4193b
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash208fa7e01f72a50334f3d7607f6b82bf | — | |
hash3283f8c54a3ddf0bc0d4111cc1f950c0 | — | |
hash576de7a075637122f47d02d4288e3dd6 | — | |
hash5f71b83ca752cb128b67dbb1832205a4 | — | |
hash643696a052ea1963e24cfb0531169477 | — | |
hash752e3eb5a9c295ee285205fb39b67fc4 | — | |
hash7888eb4f51413d9382e2b992b667d9f5 | — | |
hash88487ab7a666081721e1dd1999fb9fb2 | — | |
hasha3fc46332dcd0a95e336f6927bae8bb7 | — | |
hasha8eeda4ae7db3357ed2ee0d94b963eff | — | |
hashaf8fd03c1ec81811acf16d4182f3b5e1 | — | |
hashc0c04df98b7d1ca9e8c08dd1ffbdd16b | — | |
hashc1e4be64f80bc019651f84ef852dfa6c | — | |
hashd42ba771541893eb047a0e835bd4f84e | — | |
hashe27edcdeb44522a9036f5e4cd23f1f0c | — | |
hashea50282fa1269836a7e87eddb10f95f7 | — | |
hashf5765930205719c2ac9d2e26c3b03d8d | — | |
hash13c11692bfe44acc5b43b0fdd00acbff905cf50e | — | |
hash41fe944afb515ea5dbf771fc4d87726d4b7937f0 | — | |
hash49c43e4104e308eb8ab6435e528c7a94f8de22c7 | — | |
hash5a7aa24c9165052e3343946472985ed4e3f559ff | — | |
hashc4c0ac50f702a62ef97e42a48dde3e362884d7e7 | — | |
hashe6d84f455a2771259e613dadf297eb7b11b2fd6129bf1b432e7308ad70e06d0e | — | |
hashe7ea07553eb80ba6b6b7120e883c9c2eea37d2d821b8a84f74c8dc5539f6bc1d | — | |
hasheaa8636abb0ed6d29c1622a5df624fb0a961c7efb86f2efe3e63271b2cf7a1cc | — | |
hashec74ae56c8220a885b0b20b44bc458752798b4c67412f6b3ca70edfd37e9632a | — | |
hashec8da71984ac0a6b13881ec4b1d7ebd2c1c59a84cf580958c9ca71b25943ba75 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip195.246.231.60 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://arkanix.pw/api/features/ | — | |
urlhttps://arkanix.pw/api/session/create | — | |
urlhttps://arkanix.pw/stealer.py | — | |
urlhttps://arkanix.pw/upload_dropper.py | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainarkanix.pw | — | |
domainarkanix.ru | — |
Threat ID: 69970717b557332a80d468e5
Added to database: 2/19/2026, 12:50:31 PM
Last enriched: 2/19/2026, 1:05:47 PM
Last updated: 2/19/2026, 8:21:32 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Uncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
MediumClickFix in action: how fake captcha can encrypt an entire company
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumThe Curious Case of the Triton Malware Fork
MediumInvitation to Trouble: The Rise of Calendar Phishing Attacks
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.