Skip to content

Hide Navigation Hide TOC

Prynt Stealer (8f5a452a-4056-4004-bc9a-4c11cb8cf2b4)

Prynt Stealer is an information stealer that has the ability to capture credentials that are stored on a compromised system including web browsers, VPN/FTP clients, as well as messaging and gaming applications. Its developer based the malware code on open source projects including AsyncRAT and StormKitty. Prynt Stealer uses Telegram to exfiltrate data that is stolen from victims. Its author added a backdoor Telegram channel to collect the information stolen by other criminals.

Cluster A Galaxy A Cluster B Galaxy B Level
DarkEye (46bff4ad-09fe-4ac5-803e-daa3b73e3aaf) Stealer Prynt Stealer (8f5a452a-4056-4004-bc9a-4c11cb8cf2b4) Stealer 1
WorldWind (d410b534-07a4-4190-b253-f6616934bea6) Stealer Prynt Stealer (8f5a452a-4056-4004-bc9a-4c11cb8cf2b4) Stealer 1
DarkEye (46bff4ad-09fe-4ac5-803e-daa3b73e3aaf) Stealer WorldWind (d410b534-07a4-4190-b253-f6616934bea6) Stealer 2