Malware Analysis Another Evasive Discord Token Stealer Disguised as PC game 🎮☠️

Status
Not open for further replies.

Kongo

Level 36
Thread author
Verified
Top Poster
Well-known
Feb 25, 2017
2,584
Found another discord token stealer similar to the last one I posted a few days ago that is also only detected by one engine on VirusTotal. Would be interesting to see how multiple AVs react to this threat as it's barely detected by any engine.

Maybe @Shadowra @Trident @Jengo want to test it with CheckPoint, Deep Instinct etc.

Just if you find the time of course ;)

Website with the stealer: https://kyrazon[.]com

❗Password to the archive is "KS2024"❗

VirusTotal: VirusTotal

Triage: c765f61cee33c326acc4ea19256267c35129a1ec7edb567fe0b5ed9a88e3d6b1 | Triage

AnyRun: Analysis KyrazonSetup.exe (MD5: 7A84BBEADE50E7110FE8D278DC22B92D) Malicious activity - Interactive analysis ANY.RUN

FileScan: Filescan.IO - Next-Gen Malware Analysis Platform

Hybrid Analysis: Free Automated Malware Analysis Service - powered by Falcon Sandbox
 

Bot

AI-powered Bot
Apr 21, 2016
4,315
Thanks for sharing this. It's concerning to see another token stealer barely detected by AV engines. I hope @Shadowra, @Trident, and @Jengo can provide some insights with their respective tools. It's crucial to stay vigilant and keep our systems protected against such threats.
 
  • Like
Reactions: Khushal

Andrew3000

Level 11
Verified
Top Poster
Malware Hunter
Well-known
Feb 8, 2016
537
Some tests


Check Point Harmony:
Catched
Report here: Harmony Endpoint Forensics Analysis: Overview
1722583294658.png

1722583298969.png

1722583324916.png
1722583612217.png

Norton v22
Only firewall reaction due to invalid signature.
1722584057019.png

Avast One:
No reaction

1722584394546.png

1722584397815.png

1722584415230.png

1722584439198.png

Kaspersky
Catched

1722585405066.png

1722585409462.png

1722585412785.png

1722585430393.png

1722585496437.png

1722585479252.png
 

Shadowra

Level 36
Verified
Top Poster
Content Creator
Malware Tester
Well-known
Sep 2, 2021
2,582
Capture d’écran 2024-08-02 112934.png
Capture d’écran 2024-08-02 113153.png


Detected when using reg.exe . Actions have been stopped.


Not detected :(
Capture d’écran 2024-08-02 114143.png

Capture d’écran 2024-08-02 115649.png

Capture d’écran 2024-08-02 115729.png

Capture d’écran 2024-08-02 115815.png


Detected by the anti-malware engine (probably Cloud detection) and by ATP.
The file has been removed and Bitdefender has performed a remediation.
 

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,351
But the most interesting things is, it seems to be pushing 2 different versions. Mine didn’t have reg.exe anywhere in the chain. I turned application control off to see the whole chain. @Shadowra and @Andrew3000 detections are the same (clipbanker/Nova) but mine is RiseProStealer. Mine attempted to connect to some suspicious URLs such as oshi(.)net (not observed on Andrew300’s test). Needless to say connection failed — untested/uncategorised URLs and domains are blocked under my policy.
Mine has a file kyrazongodot.exe, which is not on Andrew300’s forensics report.

Most likely depending on the region or other system information, it decides what to deploy.
 

Kongo

Level 36
Thread author
Verified
Top Poster
Well-known
Feb 25, 2017
2,584
View attachment 284679View attachment 284680

Detected when using reg.exe . Actions have been stopped.



View attachment 284682
View attachment 284683
View attachment 284684

Detected by the anti-malware engine (probably Cloud detection) and by ATP.
The file has been removed and Bitdefender has performed a remediation.
Deep Instinct without max settings I assume? Thanks for testing! :)
 

Khushal

Level 2
Apr 4, 2024
70
Found another discord token stealer similar to the last one I posted a few days ago that is also only detected by one engine on VirusTotal. Would be interesting to see how multiple AVs react to this threat as it's barely detected by any engine.

Maybe @Shadowra @Trident @Jengo want to test it with CheckPoint, Deep Instinct etc.

Just if you find the time of course ;)

Website with the stealer: https://kyrazon[.]com

❗Password to the archive is "KS2024"❗

VirusTotal: VirusTotal

Triage: c765f61cee33c326acc4ea19256267c35129a1ec7edb567fe0b5ed9a88e3d6b1 | Triage

AnyRun: Analysis KyrazonSetup.exe (MD5: 7A84BBEADE50E7110FE8D278DC22B92D) Malicious activity - Interactive analysis ANY.RUN

FileScan: Filescan.IO - Next-Gen Malware Analysis Platform

Hybrid Analysis: Free Automated Malware Analysis Service - powered by Falcon Sandbox
Funnily and interestingly enough AVG, Avast and Norton ignore this threat but Avira blocks it.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top