Prynt Stealer is an information stealer that has the ability to capture credentials that are stored on a compromised system including web browsers, VPN/FTP clients, as well as messaging and gaming applications
The Prynt Stealer developer based the malware code on open source projects including AsyncRAT and StormKitty
Prynt Stealer uses Telegram to exfiltrate data that is stolen from victims
The Prynt Stealer malware author added a backdoor Telegram channel to collect the information stolen by other criminals
The informational stealer malware families known as DarkEye and WorldWind are near identical to Prynt Stealer
Prynt Stealer is a relatively new information stealer malware family that is written in .NET.
The malware has previously been analyzed in-depth including the data harvesting capabilities and the targeted applications.
Zscaler ThreatLabz has since uncovered additional details about the malware including the codebase being derived from at least two other open source malware families: AsyncRAT and StormKitty.