Invicta Stealer: A Powerful, Native Stealer

Invicta Stealer: A Powerful, Native Stealer

vZip by Prapattimynk

This is a C++ stealer which is being actively improved upon, with the help we receive from our active community.BROWSERSInformation is obtained from all the profiles from all chromium-based (the most

Android Android 5.0Malicious Scripts
( 261 ratings )
Price: $0
File Invicta Stealer
Publisher Prapattimynk
Genre Malicious Scripts
Size 1MB
File Type Zip
Os All
Mod Version Zip
Report Report
Invicta Stealer is the most famous version in the Invicta Stealer series of publisher
Download

This is a C++ stealer which is being actively improved upon, with the help we receive from our active community.

BROWSERS
Information is obtained from all the profiles from all chromium-based (the most used) browsers, and firefox.
We collect: credit card data, autofill, history, all extensions which include 71 crypto wallets and various authenticators, local storage, downloads, and much more. Essentially, all the information is collected.

DISCORD
All of the discord tokens are extracted from: the regular client, discord canary, ptb discord and browser local storage

CRYPTO
Wallet information is collected from 25 wallets, with new ones being actively added.

SENSITIVE DIRECTORIES AND FILES
We have studied real world scenarios, and came up with advanced filters that will fetch you sensitive information related to cryptocurrency wallets, bank accounts, passwords, private keys, etc.
The stealer gets recently opened .txt files, recursively iterates through the computer to find sensitive information, steals github and visual studio code repositories (with bloat removed), gets .txt files from desktop, documents, etc

FTP CLIENTS
Information is obtained from WinSCP and FileZilla

SYSTEM INFORMATION
We collect system information, which includes the HWID, IP, timezone, computer language, RAM, CPU information, etc

ANTI-DEBUGGING, EVASION TECHNIQUES
We use anti-debug/anti-virustotal/anti-vm techniques which complicate analysis of the malware. Your link will be encrypted in the stealer file.
Sensitive operations are performed through syscalls, which make them harder to detect by AVs and analysts, and all strings are encrypted.



Recommended for You

You may also like

Comments

Your email address will not be published. Required fields are marked *

Next Post X
Ads Blocker Image Powered by Code Help Pro

AdBlocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.