SYMBOLCOMMON_NAMEaka. SYNONYMS
jar.akemi (Back to overview)

Akemi


According to VMRay, this malware family uses in interesting obfuscation technique: a trailing slash in its archive to confuse analysis tools. It abuses #GitHub as a #C2 and exfiltrates stolen data, such as browser cookies, via Discord webhooks. The GitHub repositories are quite active and exist since mid to late 2024. The malware also monitors keyboard and mouse input, takes screenshots.

References
2025-05-21Twitter (@VMRay)VMRay
Tweet about Akemi
Akemi

There is no Yara-Signature yet.