• We just launched and are currently in beta. Join us as we build and grow the community.

Invicta Stealer 2024

aziik2010

Combo Breaker
A Rep
0
0
0
Rep
0
A Vouches
0
0
0
Vouches
0
Posts
100
Likes
42
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Invicta Stealer 2024

Screenshot-1-1-4.png


Name

Invicta Stealer

Version

V.2024

Size

17 MB

Category

Malware

Date

September 15, 2024

This is a C++ stealer which is being actively improved upon, with the help we receive from our active community.BROWSERS Information is obtained from all the profiles from all chromium-based (the most used) browsers, and firefox. We collect: credit card data, autofill, history, all extensions which include 80+ crypto wallets, various authenticators and password managers, local storage, downloads, and much more. Essentially, all the information is collected.


.


DISCORD
All of the discord tokens are extracted from: the regular client, discord canary, ptb discord and browser local storageCRYPTO
Wallet information is collected from 25 wallets, with new ones being actively added.SENSITIVE DIRECTORIES AND FILES
We have studied real world scenarios, and came up with advanced filters that will fetch you sensitive information related to cryptocurrency wallets, bank accounts, passwords, private keys, etc. The stealer gets recently opened .txt files, recursively iterates through the computer to find sensitive information, steals github and visual studio code repositories (with bloat removed), gets .txt files from desktop, documents, etcFTP CLIENTS
WinSCP and FileZillaGAMING CLIENTS
Steam sessions, usernames and a list of gamesPASSWORD MANAGERS
KeepassSYSTEM INFORMATION
Invicta Stealer 2024 collect system information, which includes the HWID, IP, timezone, computer language, RAM, CPU information, Windows & build version, path of the stealer, list of installed apps, etcANTI-DEBUGGING, EVASION TECHNIQUES
Invicta Stealer 2024 use anti-debug/anti-virustotal/anti-vm techniques which complicate analysis of the malware. Your link will be encrypted in the stealer file. Sensitive operations are performed through syscalls, which make them harder to detect by AVs and analysts, and all strings are encrypted.TUTORIAL
Download the Builder ZIP file
Run Builder.exe
Input discord webhook, or an URL to your HTTP server into the box
Click build
Patched stealer will be available in out/InvictaStealer.exe


You must upgrade your account or reply in the thread to view hidden text.


You must upgrade your account or reply in the thread to view hidden text.


You must upgrade your account or reply in the thread to view hidden text.


</h3>

<h3>
 

452,292

324,125

324,133

Top