{"id":1409,"date":"2026-02-19T11:06:09","date_gmt":"2026-02-19T11:06:09","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/"},"modified":"2026-02-19T11:06:09","modified_gmt":"2026-02-19T11:06:09","slug":"arkanix-stealer-a-c-python-infostealer","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/","title":{"rendered":"Arkanix Stealer: a C++ &amp; Python infostealer"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<h2 id=\"introduction\">Introduction<\/h2>\n<p>In October 2025, we discovered a series of forum posts advertising a previously unknown stealer, dubbed \u201cArkanix Stealer\u201d by its authors. It operated under a MaaS (malware-as-a-service) model, providing users not only with the implant but also with access to a control panel featuring configurable payloads and statistics. The set of implants included a publicly available browser post-exploitation tool known as ChromElevator, which was delivered by a native C++ version of the stealer. This version featured a wide range of capabilities, from collecting system information to stealing cryptocurrency wallet data. Alongside that, we have also discovered Python implementation of the stealer capable of dynamically modifying its configuration. The Python version was often packed, thus giving the adversary multiple methods for distributing their malware. It is also worth noting that Arkanix was rather a one-shot malicious campaign: at the time of writing this article, the affiliate program appears to be already taken down.<\/p>\n<p>Kaspersky products detect this threat as <code>Trojan-PSW.Win64.Coins.*<\/code>, <code>HEUR:Trojan-PSW.Multi.Disco.gen<\/code>, <code>Trojan.Python.Agent.*<\/code>.<\/p>\n<h2 id=\"technical-details\">Technical details<\/h2>\n<h3 id=\"background\">Background<\/h3>\n<p>In October 2025, a series of posts was discovered on various dark web forums, advertising a stealer referred to by its author as \u201cArkanix Stealer\u201d. These posts detail the features of the stealer and include a link to a Discord server, which serves as the primary communication channel between the author and the users of the stealer.<\/p>\n<div id=\"attachment_119007\" style=\"width: 1618px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1.png\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-119007\" class=\"size-full wp-image-119007\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1.png\" alt=\"Example of an Arkanix Stealer advertisement\" width=\"1608\" height=\"1410\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1.png 1608w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-300x263.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-1024x898.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-768x673.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-1536x1347.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-399x350.png 399w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-740x649.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-319x280.png 319w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18163934\/Arkanix-Stealer1-800x701.png 800w\" sizes=\"(max-width: 1608px) 100vw, 1608px\"><\/a><\/p>\n<p id=\"caption-attachment-119007\" class=\"wp-caption-text\">Example of an Arkanix Stealer advertisement<\/p>\n<\/div>\n<p>Upon further research utilizing public resources, we identified a set of implants associated with this stealer.<\/p>\n<h3 id=\"initial-infection-or-spreading\">Initial infection or spreading<\/h3>\n<p>The initial infection vector remains unknown. However, based on some of the file names (such as <code>steam_account_checker_pro_v1.py<\/code>, <code>discord_nitro_checker.py<\/code>, and <code>TikTokAccountBotter.exe<\/code>) of the loader scripts we obtained, it can be concluded with high confidence that the initial infection vector involved phishing.<\/p>\n<h3 id=\"python-loader\">Python loader<\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>MD5<\/strong><\/td>\n<td>208fa7e01f72a50334f3d7607f6b82bf<\/td>\n<\/tr>\n<tr>\n<td><strong>File name<\/strong><\/td>\n<td>discord_nitro_code_validator_right_aligned.py<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The Python loader is the script responsible for downloading and executing the Python-based version of the Arkanix infostealer. We have observed both plaintext Python scripts and those bundled using PyInstaller or Nuitka, all of which share a common execution vector and are slightly obfuscated. These scripts often serve as decoys, initially appearing to contain legitimate code. Some of them do have useful functionality, and others do nothing apart from loading the stealer. Additionally, we have encountered samples that employ no obfuscation at all, in which the infostealer is launched in a separate thread via Python\u2019s built-in <code>threading<\/code> module.<\/p>\n<div id=\"attachment_119008\" style=\"width: 2088px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119008\" class=\"size-full wp-image-119008\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2.png\" alt=\"Variants of Python loaders executing the next stage\" width=\"2078\" height=\"650\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2.png 2078w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-300x94.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-1024x320.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-768x240.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-1536x480.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-2048x641.png 2048w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-1119x350.png 1119w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-740x231.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-895x280.png 895w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164230\/Arkanix-Stealer2-800x250.png 800w\" sizes=\"auto, (max-width: 2078px) 100vw, 2078px\"><\/a><\/p>\n<p id=\"caption-attachment-119008\" class=\"wp-caption-text\">Variants of Python loaders executing the next stage<\/p>\n<\/div>\n<p>Upon execution, the loader first installs the required packages \u2014 namely, <code>requests<\/code>, <code>pycryptodome<\/code>, and <code>psutil<\/code> \u2014 via the <code>pip<\/code> package manager, utilizing the <code>subprocess<\/code> module. On Microsoft Windows systems, the loader also installs <code>pywin32<\/code>. In some of the analyzed samples, this process is carried out twice. Since the loader does not perform any output validation of the module installation command, it proceeds to make a POST request to <code>hxxps:\/\/arkanix[.]pw\/api\/session\/create<\/code> to register the current compromised machine on the panel with a predefined set of parameters even if the installation failed. After that, the stealer makes a GET request to <code>hxxps:\/\/arkanix[.]pw\/stealer.py<\/code> and executes the downloaded payload.<\/p>\n<h2 id=\"python-stealer-version\">Python stealer version<\/h2>\n<table>\n<tbody>\n<tr>\n<td><strong>MD5<\/strong><\/td>\n<td>af8fd03c1ec81811acf16d4182f3b5e1<\/td>\n<\/tr>\n<tr>\n<td><strong>File name<\/strong><\/td>\n<td>\u2013<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>During our research, we obtained a sample of the Python implementation of the Arkanix stealer, which was downloaded from the endpoint <code>hxxps:\/\/arkanix[.]pw\/stealer.py<\/code> by the previous stage.<\/p>\n<p>The stealer\u2019s capabilities \u2014 or features, as referred to by the author \u2014 in this version are configurable, with the default configuration predefined within the script file. To dynamically update the feature list, the stealer makes a GET request to <code>hxxps:\/\/arkanix[.]pw\/api\/features\/{payload_id}<\/code>, indicating that these capabilities can be modified on the panel side. The feature list is identical to the one that was described <a href=\"https:\/\/www.gdatasoftware.com\/blog\/2025\/12\/38306-arkanix-stealer\" target=\"_blank\" rel=\"noopener\">in the GDATA report<\/a>.<\/p>\n<div id=\"attachment_119009\" style=\"width: 1012px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119009\" class=\"size-full wp-image-119009\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3.png\" alt=\"Configurable options\" width=\"1002\" height=\"349\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3.png 1002w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3-300x104.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3-768x267.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3-740x258.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3-804x280.png 804w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18164647\/Arkanix-Stealer3-800x279.png 800w\" sizes=\"auto, (max-width: 1002px) 100vw, 1002px\"><\/a><\/p>\n<p id=\"caption-attachment-119009\" class=\"wp-caption-text\">Configurable options<\/p>\n<\/div>\n<p>Prior to executing the information retrieval-related functions, the stealer makes a request to <code>hxxps:\/\/arkanix[.]pw\/upload_dropper.py<\/code>, saves the response to <code>%TEMP%upd_{random 8-byte name}.py<\/code>, and executes it. We do not have access to the contents of this script, which is referred to as the \u201cdropper\u201d by the attackers.<\/p>\n<p>During its main information retrieval routine, at the end of each processing stage, the collected information is serialized into JSON format and saved to a predefined path, such as <code>%LOCALAPPDATAArkanix_lol%info_class%.json<\/code>.<\/p>\n<p>In the following, we will provide a more detailed description of the Python version\u2019s data collection features.<\/p>\n<h3 id=\"system-info-collection\">System info collection<\/h3>\n<p>Arkanix Stealer is capable of collecting a set of info about the compromised system. This info includes:<\/p>\n<ul>\n<li>OS version<\/li>\n<li>CPU and GPU info<\/li>\n<li>RAM size<\/li>\n<li>Screen resolution<\/li>\n<li>Keyboard layout<\/li>\n<li>Time zone<\/li>\n<li>Installed software<\/li>\n<li>Antivirus software<\/li>\n<li>VPN<\/li>\n<\/ul>\n<p>Information collection is performed using standard shell commands with the exception of the VPN check. The latter is implemented by querying the endpoint <code>hxxps:\/\/ipapi[.]co\/json\/<\/code> and verifying whether the associated IP address belongs to a known set of VPNs, proxies, or Tor exit nodes.<\/p>\n<h3 id=\"browser-features\">Browser features<\/h3>\n<p>This stealer is capable of extracting various types of data from supported browsers (22 in total, ranging from the widely popular Google Chrome to the Tor Browser). The list of supported browsers is hardcoded, and unlike other parameters, it cannot be modified during execution. In addition to a separate Chrome grabber module (which we\u2019ll discuss later), the stealer itself supports the extraction of diverse information, such as:<\/p>\n<ul>\n<li>Browser history (URLs, visit count and last visit)<\/li>\n<li>Autofill information (email, phone, addresses and payment cards details)<\/li>\n<li>Saved passwords<\/li>\n<li>Cookies<\/li>\n<li>In case of Chromium-based browsers, 0Auth2 data is also extracted<\/li>\n<\/ul>\n<p>All information is decrypted using either the Windows DPAPI or AES, where applicable, and searched for relevant keywords. In the case of browser information collection, the stealer searches exclusively for keywords related to banking (e.g., \u201crevolut\u201d, \u201cstripe\u201d, \u201cbank\u201d) and cryptocurrencies (e.g., \u201cbinance\u201d, \u201cmetamask\u201d, \u201cwallet\u201d). In addition to this, the stealer is capable of extracting extension data from a hardcoded list of extensions associated with cryptocurrencies.<\/p>\n<div id=\"attachment_119010\" style=\"width: 1224px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119010\" class=\"size-full wp-image-119010\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4.png\" alt=\"Part of the extension list which the stealer utilizes to extract data from\" width=\"1214\" height=\"602\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4.png 1214w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4-300x149.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4-1024x508.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4-768x381.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4-706x350.png 706w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4-740x367.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4-565x280.png 565w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165527\/Arkanix-Stealer4-800x397.png 800w\" sizes=\"auto, (max-width: 1214px) 100vw, 1214px\"><\/a><\/p>\n<p id=\"caption-attachment-119010\" class=\"wp-caption-text\">Part of the extension list which the stealer utilizes to extract data from<\/p>\n<\/div>\n<h3 id=\"telegram-info-collection\">Telegram info collection<\/h3>\n<p>Telegram data collection begins with terminating the Telegram.exe process using the <code>taskkill<\/code> command. Subsequently, if the <code>telegram_optimized<\/code> feature is set to False, the malware zips the entire tdata directory (typically located at <code>%APPDATA%RoamingTelegram Desktoptdata<\/code>) and transmits it to the attacker. Otherwise, it selectively copies and zips only the subdirectories containing valuable info, such as message log. The generated archive is sent to the endpoint <code>\/delivery<\/code> with the filename <code>tdata_session.zip<\/code>.<\/p>\n<h3 id=\"discord-capabilities\">Discord capabilities<\/h3>\n<p>The stealer includes two features connected with Discord: credentials stealing and self-spreading. The first one can be utilized to acquire credentials both from the standard client and custom clients. If the client is Chromium-based, the stealer employs the same data exfiltration mechanism as during browser credentials stealing.<\/p>\n<p>The self-spreading feature is configurable (meaning it can be disabled in the config). The stealer acquires the list of user\u2019s friends and channels via the Discord API and sends a message provided by the attacker. This stealer does not support attaching files to such messages.<\/p>\n<h3 id=\"vpn-data-collection\">VPN data collection<\/h3>\n<p>The VPN collector is searching for a set of known VPN software to extract account credentials from the credentials file with a known path that gets parsed with a regular expression. The extraction occurs from the following set of applications:<\/p>\n<ul>\n<li>Mullvad VPN<\/li>\n<li>NordVPN<\/li>\n<li>ExpressVPN<\/li>\n<li>ProtonVPN<\/li>\n<\/ul>\n<h3 id=\"file-retrieval\">File retrieval<\/h3>\n<p>File retrieval is performed regardless of the configuration. The script relies on a predefined set of paths associated with the current user (such as Desktop, Download, etc.) and file extensions mainly connected with documents and media. The script also has a predefined list of filenames to exfiltrate. The extracted files are packed into a ZIP archive which is later sent to the C2 asynchronously. An interesting aspect is that the filename list includes several French words, such as \u201cmotdepasse\u201d (French for \u201cpassword\u201d), \u201cbanque\u201d (French for \u201cbank\u201d), \u201csecret\u201d (French for \u201csecret\u201d), and \u201ccompte\u201d (French for \u201caccount\u201d).<\/p>\n<h3 id=\"other-payloads\">Other payloads<\/h3>\n<p>We were able to identify additional modules that are downloaded from the C2 rather than embedded into the stealer script; however, we weren\u2019t able to obtain them. These modules can be described by the following table, with the \u201cDetails\u201d column referring to the information that could be extracted from the main stealer code.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Module name<\/strong><\/td>\n<td><strong>Endpoint to download<\/strong><\/td>\n<td><strong>Details<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Chrome grabber<\/td>\n<td>\/api\/chrome-grabber-template\/{payload_id}<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>Wallet patcher<\/td>\n<td>\/api\/wallet-patcher\/{payload_id}<\/td>\n<td>Checks whether \u201cExodus\u201d and \u201cAtomic\u201d cryptocurrency wallets are installed<\/td>\n<\/tr>\n<tr>\n<td>Extra collector<\/td>\n<td>\/api\/extra-collector\/{payload_id}<\/td>\n<td>Uses a set of options from the config, such as collect_filezilla, collect_vpn_data, collect_steam, and collect_screenshots<\/td>\n<\/tr>\n<tr>\n<td>HVNC<\/td>\n<td>\/hvnc<\/td>\n<td>Is saved to the Startup directory (%APPDATA%MicrosoftWindowsStart MenuProgramsStartuphvnc.py) to execute upon system boot<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The Wallet patcher and Extra collector scripts are received in an encrypted form from the C2 server. To decrypt them, the attackers utilize the AES-GCM algorithm in conjunction with PBKDF2 (HMAC and SHA256). After decryption, the additional payload has its template placeholders replaced and is stored under a partially randomized name within a temporary folder.<\/p>\n<div id=\"attachment_119011\" style=\"width: 1904px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119011\" class=\"size-full wp-image-119011\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5.png\" alt=\"Decryption routine and template substitution\" width=\"1894\" height=\"608\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5.png 1894w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-300x96.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-1024x329.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-768x247.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-1536x493.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-1090x350.png 1090w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-740x238.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-872x280.png 872w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18165850\/Arkanix-Stealer5-800x257.png 800w\" sizes=\"auto, (max-width: 1894px) 100vw, 1894px\"><\/a><\/p>\n<p id=\"caption-attachment-119011\" class=\"wp-caption-text\">Decryption routine and template substitution<\/p>\n<\/div>\n<p>Once all operations are completed, the stealer removes itself from the drive, along with the artifacts folder (<code>Arkanix_lol<\/code> in this case).<\/p>\n<h2 id=\"native-version-of-stealer\">Native version of stealer<\/h2>\n<table>\n<tbody>\n<tr>\n<td><strong>MD5<\/strong><\/td>\n<td>a3fc46332dcd0a95e336f6927bae8bb7<\/td>\n<\/tr>\n<tr>\n<td><strong>File name<\/strong><\/td>\n<td>ArkanixStealer.exe<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>During our analysis, we were able to obtain both the release and debug versions of the native implementation, as both were uploaded to publicly available resources. The following are the key differences between the two:<\/p>\n<ul>\n<li>The release version employs VMProtect, but does not utilize code virtualization.<\/li>\n<li>The debug version communicates with a Discord bot for command and control (C2), whereas the release version uses the previously mentioned C2 domain <code>arkanix[.]pw<\/code>.<\/li>\n<li>The debug version includes extensive logging, presumably for the authors\u2019 debugging purposes.<\/li>\n<\/ul>\n<p>Notably, the native implementation explicitly references the name of the stealer in the <code>VersionInfo<\/code> resources. This naming convention is consistent across both the debug version and certain samples containing the release version of the implant.<\/p>\n<div id=\"attachment_119012\" style=\"width: 478px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170104\/Arkanix-Stealer6.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119012\" class=\"size-full wp-image-119012\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170104\/Arkanix-Stealer6.png\" alt=\"Version info\" width=\"468\" height=\"260\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170104\/Arkanix-Stealer6.png 468w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170104\/Arkanix-Stealer6-300x167.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170104\/Arkanix-Stealer6-270x150.png 270w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\"><\/a><\/p>\n<p id=\"caption-attachment-119012\" class=\"wp-caption-text\">Version info<\/p>\n<\/div>\n<p>After launching, the stealer implements a series of analysis countermeasures to verify that the application is not being executed within a sandboxed environment or run under a debugger. Following these checks, the sample patches <code>AmsiScanBuffer<\/code> and <code>EtwEventWrite<\/code> to prevent the triggering of any unwanted events by the system.<\/p>\n<p>Once the preliminary checks are completed, the sample proceeds to gather information about the system. The list of capabilities is hardcoded and cannot be modified from the server side, in contrast to the Python version. What is more, the feature list is quite similar to the Python version except a few ones.<\/p>\n<h3 id=\"rdp-connections\">RDP connections<\/h3>\n<p>The stealer is capable of collecting information about known RDP connections that the compromised user has. To achieve this, it searches for .rdp files in <code>%USERPROFILE%Documents<\/code> and extracts the full server address, password, username and server port.<\/p>\n<h3 id=\"gaming-files\">Gaming files<\/h3>\n<p>The stealer also targets gamers and is capable to steal credentials from the popular gaming platform clients, including:<\/p>\n<ul>\n<li>Steam<\/li>\n<li>Epic Games Launcher<\/li>\n<li>net<\/li>\n<li>Riot<\/li>\n<li>Origin<\/li>\n<li>Unreal Engine<\/li>\n<li>Ubisoft Connect<\/li>\n<li>GOG<\/li>\n<\/ul>\n<h3 id=\"screenshots\">Screenshots<\/h3>\n<p>The native version, unlike its Python counterpart, is capable of capturing screenshots for each monitor via <code>capCreateCaptureWindowA WinAPI<\/code>.<br \/>\nIn conclusion, this sample communicates with the C2 server through the same endpoints as the Python version. However, in this instance, all data is encrypted using the same AES-GCM + PBKDF2 (HMAC and SHA256) scheme as partially employed in the Python variant. In some observed samples, the key used was <code>arkanix_secret_key_v20_2024<\/code>. Alongside that, the C++ sample explicitly sets the User-Agent to <code>ArkanixStealer\/1.0<\/code>.<\/p>\n<h3 id=\"post-exploitation-browser-data-extractor\">Post-exploitation browser data extractor<\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>MD5<\/strong><\/td>\n<td>3283f8c54a3ddf0bc0d4111cc1f950c0<\/td>\n<\/tr>\n<tr>\n<td><strong>File name<\/strong><\/td>\n<td>\u2013<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This is an implant embedded within the resources of the C++ implementation. The author incorporated it into the resource section without applying any obfuscation or encryption. Subsequently, the stealer extracts the payload to a temporary folder with a randomly generated name composed of hexadecimal digits (0-9 and A-F) and executes it using the <code>CreateProcess WinAPI<\/code>. The payload itself is the unaltered publicly available project known as \u201cChromElevator\u201d. To summarize, this tool consists of two components: an injector and the main payload. The injector initializes a direct syscall engine, spawns a suspended target browser process, and injects the decrypted code into it via Nt syscalls. The injected payload then decrypts the browser master key and exfiltrates data such as cookies, login information, web data, and so on.<\/p>\n<h2 id=\"infrastructure\">Infrastructure<\/h2>\n<p>During the Arkanix campaign, two domains used in the attacks were identified. Although these domains were routed through Cloudflare, a real IP address was successfully discovered for one of them, namely, <code>arkanix[.]pw<\/code>. For the second one we only obtained a Cloudflare IP address.<\/p>\n<table>\n<thead>\n<tr>\n<td><strong>Domain<\/strong><\/td>\n<td><strong>IP<\/strong><\/td>\n<td><strong>First seen<\/strong><\/td>\n<td><strong>ASN<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>arkanix[.]pw<\/td>\n<td>195.246.231[.]60<\/td>\n<td>Oct 09, 2025<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>arkanix[.]ru<\/td>\n<td>172.67.186[.]193<\/td>\n<td>Oct 19, 2025<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Both servers were also utilized to host the stealer panel, which allows attackers to monitor their victims. The contents of the panel are secured behind a sign-in page. Closer to the end of our research, the panel was seemingly taken down with no message or notice.<\/p>\n<div id=\"attachment_119013\" style=\"width: 1800px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119013\" class=\"size-full wp-image-119013\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7.png\" alt=\"Stealer panel sign-in page\" width=\"1790\" height=\"1370\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7.png 1790w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-300x230.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-1024x784.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-768x588.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-1536x1176.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-457x350.png 457w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-740x566.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-366x280.png 366w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170518\/Arkanix-Stealer7-800x612.png 800w\" sizes=\"auto, (max-width: 1790px) 100vw, 1790px\"><\/a><\/p>\n<p id=\"caption-attachment-119013\" class=\"wp-caption-text\">Stealer panel sign-in page<\/p>\n<\/div>\n<h3 id=\"stealer-promotion\">Stealer promotion<\/h3>\n<p>During the research of this campaign, we noticed that the forum posts advertising the stealer contained a link leading to a Discord server dubbed \u201cArkanix\u201d by the authors. The server posed as a forum where authors posted various content and clients could ask various questions regarding this malicious software. While users mainly thank and ask about when the feature promised by the authors will be released and added into the stealer, the content made by the authors is broader. The adversary builds up the communication with potential buyers using the same marketing and communication methods real companies employ. To begin with, they warm up the audience by posting surveys about whether they should implement specific features, such as Discord injection and binding with a legitimate application (sic!).<\/p>\n<div id=\"attachment_119014\" style=\"width: 1510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119014\" class=\"size-full wp-image-119014\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8.png\" alt=\"Feature votes\" width=\"1500\" height=\"393\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8.png 1500w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8-300x79.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8-1024x268.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8-768x201.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8-1336x350.png 1336w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8-740x194.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8-1069x280.png 1069w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170605\/Arkanix-Stealer8-800x210.png 800w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\"><\/a><\/p>\n<p id=\"caption-attachment-119014\" class=\"wp-caption-text\">Feature votes<\/p>\n<\/div>\n<p>Additionally, the author promised to release a crypter as a side project in four to six weeks, at the end of October. As of now, the stealer seems to have been taken down without any notice while the crypter was never released.<\/p>\n<div id=\"attachment_119015\" style=\"width: 980px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119015\" class=\"size-full wp-image-119015\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9.png\" alt=\"Arkanix Crypter\" width=\"970\" height=\"557\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9.png 970w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9-300x172.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9-768x441.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9-610x350.png 610w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9-740x425.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9-488x280.png 488w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170726\/Arkanix-Stealer9-800x459.png 800w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\"><\/a><\/p>\n<p id=\"caption-attachment-119015\" class=\"wp-caption-text\">Arkanix Crypter<\/p>\n<\/div>\n<p>Furthermore, the Arkanix Stealer authors decided to implement a referral program to attract new customers. Referrers were promised an additional free hour to their premium license, while invited customers received seven days of free \u201cpremium\u201d trial use. As stated in forum posts, the premium plan included the following features:<\/p>\n<ul>\n<li>C++ native stealer<\/li>\n<li>Exodus and Atomic cryptocurrency wallets injection<\/li>\n<li>Increased payload generation, up to 10 payloads<\/li>\n<li>Priority support<\/li>\n<\/ul>\n<div id=\"attachment_119016\" style=\"width: 1367px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119016\" class=\"size-full wp-image-119016\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10.png\" alt=\"Referral program ad and corresponding panel interface\" width=\"1357\" height=\"1383\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10.png 1357w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-294x300.png 294w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-1005x1024.png 1005w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-768x783.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-343x350.png 343w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-740x754.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-275x280.png 275w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-800x815.png 800w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170824\/Arkanix-Stealer10-50x50.png 50w\" sizes=\"auto, (max-width: 1357px) 100vw, 1357px\"><\/a><\/p>\n<p id=\"caption-attachment-119016\" class=\"wp-caption-text\">Referral program ad and corresponding panel interface<\/p>\n<\/div>\n<p>Speaking of technical details, based on the screenshot of the Visual Studio stealer project that was sent to the Discord server, we can conclude that the author is German-speaking.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170917\/Arkanix-Stealer11.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119017\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170917\/Arkanix-Stealer11.png\" alt=\"\" width=\"347\" height=\"859\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170917\/Arkanix-Stealer11.png 347w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170917\/Arkanix-Stealer11-121x300.png 121w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170917\/Arkanix-Stealer11-141x350.png 141w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170917\/Arkanix-Stealer11-113x280.png 113w\" sizes=\"auto, (max-width: 347px) 100vw, 347px\"><\/a><\/p>\n<p>This same screenshot also serves as a probable indicator of AI-assisted development as it shares the common patterns of such assistants, e.g. the presence of the utils.cpp file. What provides even more confidence is the overall code structure, the presence of comments and extensive debugging log output.<\/p>\n<div id=\"attachment_119018\" style=\"width: 1311px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119018\" class=\"size-full wp-image-119018\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12.png\" alt=\"Example of LLM-specific patterns\" width=\"1301\" height=\"855\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12.png 1301w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12-300x197.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12-1024x673.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12-768x505.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12-533x350.png 533w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12-740x486.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12-426x280.png 426w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/18170954\/Arkanix-Stealer12-800x526.png 800w\" sizes=\"auto, (max-width: 1301px) 100vw, 1301px\"><\/a><\/p>\n<p id=\"caption-attachment-119018\" class=\"wp-caption-text\">Example of LLM-specific patterns<\/p>\n<\/div>\n<h2 id=\"conclusions\">Conclusions<\/h2>\n<p>Information stealers have always posed as a serious threat to users\u2019 data. Arkanix is no exception as it targets a wide range of users, from those interested in cryptocurrencies and gaming to those using online banking. It collects a vast amount of information including highly sensitive personal data. While being quite functional, it contains probable traces of LLM-assisted development which suggests that such assistance might have drastically reduced development time and costs. Hence it follows that this campaign tends to be more of a one-shot campaign for quick financial gains rather than a long-running infection. The panel and the Discord chat were taken down around December 2025, leaving no message or traces of further development or a resurgence.<\/p>\n<p>In addition, the developers behind the Arkanix Stealer decided to address the public, implementing a forum where they posted development insights, conducted surveys and even ran a referral program where you could get bonuses for \u201cbringing a friend\u201d. This behavior makes Arkanix more of a public software product than a shady stealer.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p><em>Additional IoCs are available to customers of our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/services?icid=gl_sl_ti-lnk_sm-team_63057f3138f7f09f#threat-intelligence\" target=\"_blank\">Threat Intelligence Reporting service<\/a>. For more details, contact us at <a href=\"mailto:crimewareintel@kaspersky.com\">crimewareintel@kaspersky.com<\/a>.<\/em><\/p>\n<p><strong>File hashes<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/752e3eb5a9c295ee285205fb39b67fc4\/?icid=gl_sl_opentip-lnk_sm-team_0f4d1a20821d49e4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">752e3eb5a9c295ee285205fb39b67fc4<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/c1e4be64f80bc019651f84ef852dfa6c\/?icid=gl_sl_opentip-lnk_sm-team_7234ce577907fa4f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">c1e4be64f80bc019651f84ef852dfa6c<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/a8eeda4ae7db3357ed2ee0d94b963eff\/?icid=gl_sl_opentip-lnk_sm-team_8f990b49cb4b7243&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">a8eeda4ae7db3357ed2ee0d94b963eff<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/c0c04df98b7d1ca9e8c08dd1ffbdd16b\/?icid=gl_sl_opentip-lnk_sm-team_53c448327c5f16f4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">c0c04df98b7d1ca9e8c08dd1ffbdd16b<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/88487ab7a666081721e1dd1999fb9fb2\/?icid=gl_sl_opentip-lnk_sm-team_4d190840a4797675&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">88487ab7a666081721e1dd1999fb9fb2<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/d42ba771541893eb047a0e835bd4f84e\/?icid=gl_sl_opentip-lnk_sm-team_62ac5d7e3fd979c9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">d42ba771541893eb047a0e835bd4f84e<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/5f71b83ca752cb128b67dbb1832205a4\/?icid=gl_sl_opentip-lnk_sm-team_4168606d4ea82500&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">5f71b83ca752cb128b67dbb1832205a4<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/208fa7e01f72a50334f3d7607f6b82bf\/?icid=gl_sl_opentip-lnk_sm-team_1e651b8b0cbbdbf8&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">208fa7e01f72a50334f3d7607f6b82bf<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/e27edcdeb44522a9036f5e4cd23f1f0c\/?icid=gl_sl_opentip-lnk_sm-team_e0bfa682a6f7a19e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">e27edcdeb44522a9036f5e4cd23f1f0c<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/ea50282fa1269836a7e87eddb10f95f7\/?icid=gl_sl_opentip-lnk_sm-team_896d702e9b641ae5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">ea50282fa1269836a7e87eddb10f95f7<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/643696a052ea1963e24cfb0531169477\/?icid=gl_sl_opentip-lnk_sm-team_f82aeab50ae6de18&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">643696a052ea1963e24cfb0531169477<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f5765930205719c2ac9d2e26c3b03d8d\/?icid=gl_sl_opentip-lnk_sm-team_75c19ce78a43ad62&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">f5765930205719c2ac9d2e26c3b03d8d<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/576de7a075637122f47d02d4288e3dd6\/?icid=gl_sl_opentip-lnk_sm-team_86d0ed98e7eb62fd&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">576de7a075637122f47d02d4288e3dd6<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/7888eb4f51413d9382e2b992b667d9f5\/?icid=gl_sl_opentip-lnk_sm-team_650feb0f3e1549d7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">7888eb4f51413d9382e2b992b667d9f5<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/3283f8c54a3ddf0bc0d4111cc1f950c0\/?icid=gl_sl_opentip-lnk_sm-team_405317ac48d9c3aa&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">3283f8c54a3ddf0bc0d4111cc1f950c0<\/a><\/p>\n<p><strong>Domains and IPs<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/arkanix.pw\/?icid=gl_sl_opentip-lnk_sm-team_ec9e8e883f23bff5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">arkanix[.]pw<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/arkanix.ru\/?icid=gl_sl_opentip-lnk_sm-team_936e3716cc1a72cc&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">arkanix[.]ru<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In October 2025, we discovered a series of forum posts advertising a previously unknown stealer, dubbed \u201cArkanix Stealer\u201d by its authors. It operated under a MaaS (malware-as-a-service) model, providing users not only with the implant but also with access to a control panel featuring configurable payloads and statistics. The set of implants included a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[683,90,228,248,505,99,232,233,682,681,236,503,684,257],"tags":[91],"class_list":["post-1409","post","type-post","status-publish","format-standard","hentry","category-arkanix-stealer","category-cybersecurity","category-data-theft","category-great-research","category-infostealers","category-malware","category-malware-descriptions","category-malware-technologies","category-malware-as-a-service","category-python","category-trojan","category-trojan-stealer","category-unix-and-macos-malware","category-windows-malware","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Arkanix Stealer: a C++ &amp; Python infostealer - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Arkanix Stealer: a C++ &amp; Python infostealer - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Introduction In October 2025, we discovered a series of forum posts advertising a previously unknown stealer, dubbed \u201cArkanix Stealer\u201d by its authors. It operated under a MaaS (malware-as-a-service) model, providing users not only with the implant but also with access to a control panel featuring configurable payloads and statistics. The set of implants included a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-19T11:06:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Arkanix Stealer: a C++ &amp; Python infostealer\",\"datePublished\":\"2026-02-19T11:06:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/\"},\"wordCount\":2751,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Arkanix Stealer\",\"Cybersecurity\",\"Data theft\",\"GReAT research\",\"Infostealers\",\"Malware\",\"Malware descriptions\",\"Malware Technologies\",\"Malware-as-a-Service\",\"Python\",\"Trojan\",\"Trojan-stealer\",\"Unix and macOS malware\",\"Windows malware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/\",\"name\":\"Arkanix Stealer: a C++ &amp; Python infostealer - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg\",\"datePublished\":\"2026-02-19T11:06:09+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Arkanix Stealer: a C++ &amp; Python infostealer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Arkanix Stealer: a C++ &amp; Python infostealer - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/","og_locale":"en_US","og_type":"article","og_title":"Arkanix Stealer: a C++ &amp; Python infostealer - Imperative Business Ventures Limited","og_description":"Introduction In October 2025, we discovered a series of forum posts advertising a previously unknown stealer, dubbed \u201cArkanix Stealer\u201d by its authors. It operated under a MaaS (malware-as-a-service) model, providing users not only with the implant but also with access to a control panel featuring configurable payloads and statistics. The set of implants included a [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-02-19T11:06:09+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Arkanix Stealer: a C++ &amp; Python infostealer","datePublished":"2026-02-19T11:06:09+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/"},"wordCount":2751,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["Arkanix Stealer","Cybersecurity","Data theft","GReAT research","Infostealers","Malware","Malware descriptions","Malware Technologies","Malware-as-a-Service","Python","Trojan","Trojan-stealer","Unix and macOS malware","Windows malware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/","name":"Arkanix Stealer: a C++ &amp; Python infostealer - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg","datePublished":"2026-02-19T11:06:09+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/19104127\/SL-Arkanix-featured-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/19\/arkanix-stealer-a-c-python-infostealer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Arkanix Stealer: a C++ &amp; Python infostealer"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1409"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1409\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}