Independent security reports for various versions of B3RAP Leecher have identified the following threats:

Similar tools like "SLAYER Leecher" have been flagged for using anti-reverse engineering tricks, such as guarded memory regions, to avoid being analyzed by security researchers. What is a "Leecher"?

It is strongly recommended that you as multiple malware analysis platforms have flagged versions of this software as malicious . Risk Assessment

Generally refers to someone who consumes resources without contributing back to the community.

A leecher is a user who is currently downloading a file or who stops sharing (seeding) after their download finishes.

Analysis from Any.Run explicitly marks the application as malicious, noting it performs actions consistent with stealing personal data.