Stealers

Acreed Infostealer – Everything We Know So Far

Acreed Infostealer – Everything We Know So Far

Infostealers and the stealer logs they produce continue to pose a significant risk to individuals and organizations alike. The malware is designed to extract sensitive credentials such as passwords, wallets, and device information, which is later distributed as a stealer log across Telegram channels, datastores and dark web forums alike. 

Through our constant monitoring of the deep and dark web, we identified a a previously undocumented infostealer. This new infostealer is distributing uniquely structured logs on the popular datastore Russian Market.

This blog provides an analysis of the stealer log extracted by this infostealer, while trying to focus on the information leaked and identifying compromised systems. 

Name: Acreed 

First emergence: February 10th, 2025

We first detected this stealer on the datastore Russian Market, where over the course of about a week over 4k logs were uploaded to the website. It seems as if this infostealer targets Windows systems.

Logs structure:

Like most infostealers, Acreed seeks to extract user information, cookies, passwords, wallets and more. Unlike other stealer log files, this stealer provides a JSON file that outlines the amount of files gathered from each type:

Acreed infostealer's logs strucutre

The stealer log itself contains a few JSON files and folders. Among them are the pc_info.json file which details the main information about the infected device, a password.text file containing URL, logins and passwords and a folder containing cookie files.

A sample of a pc_info file from an Acreed infostealer. 

A sample of a pc_info file from an Acreed infostealer. 

Compromised data 

From the observed samples, this infostealer extracts detailed system information including HWID, device and network IPs, username, as well as installed software and their version. The stealer log also provides an indication if the user has admin permissions, which can drastically increase the severity of the incident. 

We also observed stolen credentials from almost all of the major browsers like Chrome, Edge and Firefox. The password files contain usernames and passwords from social media sites, email providers, steaming services and more. On top of that this file contains local network credentials, allowing deeper network access, as well as a possible synchronization with a mobile device due to the presence of android related credentials. Furthermore, cookies were also extracted from said browsers across various different types of websites such as Google and Microsoft services. 

Both the cookies and passwords can be used maliciously to abuse online payments, gain unauthorized access to accounts, and ultimately, account takeover. 

While the samples themselves were quite scarce, we can deduce from the log_info file provided in the log that the malware does have the potential to extract additional data such as wallets and credit cards.

What can you do about it?

The infostealer threat is greater than ever. While we have covered the top infostealers before, it is undeniable that new malware enters the field frequently. Without proper monitoring of the latest threats, your information might be exposed in an easily accessible stealer log and abused to execute attacks.

This risk can be minimised by using a dark web monitoring tool like Lunar, and actively using the data provided to mitigate the threat. To ensure maximum security for you and your data, enhance general security measures and increase awareness of scam messages and phishing.

Spread the News

Not subscribed to our Dark Web Pulse updates?

By submitting you agree to Webz.io's Privacy Policy and further marketing communications.

Feed Your Machines the Data They Need

Feed Your Machines the Data They Need

GET STARTED
Learn how NESQ cut breach detection time with Lunar

Expose Hidden Risks to Your Domain

Uncover dark web threats with Lunar, the next gen dark web intel platform

Subscribe to our newsletter for more news and updates!

Ready to Explore Web Data at Scale?

Speak with a data expert to learn more about Webz.io’s solutions
Create your API account and get instant access to millions of web sources