Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Arkanix Stealer targets a variety of data, offers a MaaS referral program

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 11:10:30 UTC)
Source: AlienVault OTX General

Description

Arkanix Stealer, a newly discovered malware operating under a Malware-as-a-Service model, targets a wide range of user data including cryptocurrencies, gaming, and online banking information. The stealer, available in both Python and C++ versions, offers configurable features and employs various techniques to evade detection. It can extract data from multiple browsers, VPNs, and gaming platforms, as well as capture screenshots and RDP connection details. The malware authors promoted their product through a Discord server and implemented a referral program to attract customers. The campaign appears to have been short-lived, with infrastructure taken down around December 2025.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:05:47 UTC

Technical Analysis

Arkanix Stealer is a recently identified malware operating under a Malware-as-a-Service (MaaS) model, designed to steal a wide variety of sensitive user data. It targets cryptocurrency wallets, gaming accounts, online banking credentials, and browser-stored information by extracting data from multiple browsers, VPN clients, and gaming platforms. The malware is available in both Python and C++ versions, allowing flexibility and adaptability for its operators and affiliates. It employs various evasion techniques such as obfuscation and anti-detection methods to avoid security software detection. Additionally, it can capture screenshots and gather Remote Desktop Protocol (RDP) connection details, expanding its data theft capabilities. The operators used Discord as a marketing platform and implemented a referral program to encourage wider distribution and affiliate recruitment. Despite the campaign being short-lived with infrastructure takedown around December 2025, the malware demonstrates a sophisticated approach to data theft and distribution. The lack of known exploits in the wild suggests it may still be emerging or limited in scope, but its modular design and MaaS model indicate potential for rapid resurgence or adaptation. The malware’s tactics align with several MITRE ATT&CK techniques including credential access, data from local system, command and control, and defense evasion, highlighting its comprehensive threat profile.

Potential Impact

The Arkanix Stealer poses significant risks to individuals and organizations by compromising confidentiality of sensitive data such as cryptocurrency wallets, banking credentials, and gaming accounts. Theft of such data can lead to direct financial losses, unauthorized transactions, and identity theft. The capture of RDP connection details can facilitate further lateral movement or unauthorized remote access within enterprise environments, potentially escalating the impact. The malware’s ability to evade detection increases the likelihood of prolonged undetected presence, exacerbating damage. Organizations with employees using VPNs, remote desktop tools, or involved in gaming or cryptocurrency activities are at heightened risk. The MaaS model lowers the barrier for cybercriminals to deploy this malware, potentially increasing its spread and impact. Although the campaign was short-lived, the modular and configurable nature of the malware means it could be repurposed or reintroduced, posing ongoing threats. The impact extends beyond individual users to enterprises that rely on remote access and handle sensitive financial data, making it a multi-sector concern.

Mitigation Recommendations

To mitigate the threat posed by Arkanix Stealer, organizations should implement multi-layered defenses tailored to the malware’s capabilities. First, enforce strict endpoint protection with advanced behavioral detection capable of identifying obfuscated or polymorphic malware variants in both Python and C++. Regularly update and patch all software, especially browsers, VPN clients, and remote desktop tools, to reduce exploitation vectors. Employ network segmentation and restrict RDP access using VPNs with multi-factor authentication (MFA) and strong password policies to limit lateral movement opportunities. Monitor for unusual outbound traffic patterns indicative of data exfiltration or command and control communications. Conduct user awareness training focused on phishing and social engineering tactics that could deliver the malware payload. Disable or restrict execution of unauthorized scripts and binaries, particularly Python scripts, using application control policies. Utilize threat intelligence feeds to detect indicators of compromise related to Arkanix Stealer and proactively hunt for signs of infection. Finally, consider deploying endpoint detection and response (EDR) solutions to enable rapid detection and remediation of infections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/arkanix-stealer/119006/"]
Adversary
null
Pulse Id
6996efa6979db417fed4193b
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash208fa7e01f72a50334f3d7607f6b82bf
hash3283f8c54a3ddf0bc0d4111cc1f950c0
hash576de7a075637122f47d02d4288e3dd6
hash5f71b83ca752cb128b67dbb1832205a4
hash643696a052ea1963e24cfb0531169477
hash752e3eb5a9c295ee285205fb39b67fc4
hash7888eb4f51413d9382e2b992b667d9f5
hash88487ab7a666081721e1dd1999fb9fb2
hasha3fc46332dcd0a95e336f6927bae8bb7
hasha8eeda4ae7db3357ed2ee0d94b963eff
hashaf8fd03c1ec81811acf16d4182f3b5e1
hashc0c04df98b7d1ca9e8c08dd1ffbdd16b
hashc1e4be64f80bc019651f84ef852dfa6c
hashd42ba771541893eb047a0e835bd4f84e
hashe27edcdeb44522a9036f5e4cd23f1f0c
hashea50282fa1269836a7e87eddb10f95f7
hashf5765930205719c2ac9d2e26c3b03d8d
hash13c11692bfe44acc5b43b0fdd00acbff905cf50e
hash41fe944afb515ea5dbf771fc4d87726d4b7937f0
hash49c43e4104e308eb8ab6435e528c7a94f8de22c7
hash5a7aa24c9165052e3343946472985ed4e3f559ff
hashc4c0ac50f702a62ef97e42a48dde3e362884d7e7
hashe6d84f455a2771259e613dadf297eb7b11b2fd6129bf1b432e7308ad70e06d0e
hashe7ea07553eb80ba6b6b7120e883c9c2eea37d2d821b8a84f74c8dc5539f6bc1d
hasheaa8636abb0ed6d29c1622a5df624fb0a961c7efb86f2efe3e63271b2cf7a1cc
hashec74ae56c8220a885b0b20b44bc458752798b4c67412f6b3ca70edfd37e9632a
hashec8da71984ac0a6b13881ec4b1d7ebd2c1c59a84cf580958c9ca71b25943ba75

Ip

ValueDescriptionCopy
ip195.246.231.60

Url

ValueDescriptionCopy
urlhttps://arkanix.pw/api/features/
urlhttps://arkanix.pw/api/session/create
urlhttps://arkanix.pw/stealer.py
urlhttps://arkanix.pw/upload_dropper.py

Domain

ValueDescriptionCopy
domainarkanix.pw
domainarkanix.ru

Threat ID: 69970717b557332a80d468e5

Added to database: 2/19/2026, 12:50:31 PM

Last enriched: 2/19/2026, 1:05:47 PM

Last updated: 2/19/2026, 8:21:32 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats