Arkei Stealer

Malware updated 23 days ago (2024-11-29T13:31:22.574Z)
Download STIX
Preview STIX
The Arkei Stealer is a type of malware, specifically designed to infiltrate and exploit computer systems. This malicious software, written in C++, first emerged in May 2018 and has since been forked or rebranded several times. The malware can infect a system through various means such as suspicious downloads, emails, or websites, often without the user's awareness. Once it gains access, it has the potential to steal personal information, disrupt operations, or even hold data hostage for ransom. Vidar is an evolved version of the Arkei Stealer, developed for Windows-based systems and also written in C++. According to Specops, Vidar has adopted and improved upon the original Arkei Stealer's capabilities, making it a more potent threat. Like its predecessor, Vidar can compromise a system and perform harmful activities, including data theft and disruption of system operations. In terms of distribution methods, Vidar is often disseminated through phishing campaigns disguised as Microsoft Compiled HTML Help (CHM) files. These deceptive files serve as a vehicle for the malware to infiltrate unsuspecting users' systems. Once downloaded and opened, the CHM file releases the Vidar malware into the user's computer, where it can begin its damaging activities.
Description last updated: 2024-05-04T23:37:01.063Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Vidar is a possible alias for Arkei Stealer. Vidar is a malicious software (malware) that primarily targets Windows systems, written in C++ and based on the Arkei stealer. It has historically been favored by threat actors who sell logs through marketplaces like 2easy, alongside other infostealers such as Raccoon, RedLine, and AZORult. The malw
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Arkei Stealer Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more