Skip to content

Azury Infostealer Source Code Sold for $100 With Full Operator Panel, Crypto Wallet Theft, and Keylogging Capabilities

Dark Web Informer - Cyber Threat Intelligence

Azury Infostealer Source Code Sold for $100 With Full Operator Panel, Crypto Wallet Theft, and Keylogging Capabilities

March 12, 2026 - 6:31:57 PM UTC
N/A
Malware / Cybercrime
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-12 18:31:57 UTC
Threat Actor Jaxx
Malware Name Azury Infostealer
Language C#
Category Malware Source Code Sale
Detection Status Semi-FUD
Severity High
Price $100 (Source Code)
Network Open Web
Payment Crypto Only

Incident Overview

A threat actor going by Jaxx is selling the complete source code for a C# infostealer called Azury, described as a semi-FUD (fully undetectable) stealer built over two months of development. The package includes the stealer itself and a dedicated C# operator panel for managing infected machines, for $100.


The stealer's feature set is extensive and covers nearly every category of sensitive data on a victim's machine. It targets browser data across Chrome, Edge, Opera, Vivaldi, Brave, Yandex, Firefox, and other Chromium and Gecko-based browsers, grabbing saved passwords, cookies, bookmarks, browsing history, credit card autofill entries, and profile configurations. Cryptocurrency wallets and exchange credentials are harvested from desktop wallets like Electrum, Atomic, Exodus, MetaMask, Phantom, and TrustWallet, as well as web-based exchange logins for Binance, Coinbase, Kraken, Gemini, KuCoin, Bybit, and others.


The stealer also grabs tokens and session data from messaging platforms including Discord, Telegram, WhatsApp, Slack, Skype, Snapchat, Signal, and more. VPN credentials are harvested from NordVPN, ExpressVPN, ProtonVPN, SurfShark, Mullvad, WireGuard, and over a dozen other providers. Password manager vaults from KeePass, LastPass, Dashlane, 1Password, Bitwarden, NordPass, and others are targeted, along with gaming accounts from Steam, Epic Games, Roblox, and Battle.net. Additional capabilities include keylogging, clipboard monitoring, webcam and microphone capture, arbitrary file collection, persistence mechanisms, and anti-analysis protections including anti-debug, anti-VM, and anti-sandbox measures. Data is exfiltrated as an in-memory ZIP archive via configurable channels like Discord, FTP, or Telegram.

Stealer Target Categories

Browser Data (Passwords, Cookies, Cards) Cryptocurrency Wallets & Exchange Logins Messaging Platform Tokens VPN & Proxy Configurations FTP & File Transfer Credentials Gaming Accounts & Configs Password Manager Vaults System Credentials & RDP Keylogging & Clipboard Monitoring Webcam & Microphone Capture Arbitrary File Collection Persistence & Anti-Analysis

Claim URL - For Subscribers Only

The claim URL and unredacted screenshots for this listing can be found on the Threat Feed or Ransomware Feed for subscribers.

Image Preview

Forum listing showing Azury infostealer source code for sale with stealer description and operator panel details Azury infostealer additional features including gaming accounts, password managers, keylogging, and pricing

Latest