Indicators of Compromise (IOCs)
File Hashes (SHA-256)
`c7e6591e5e021daa30f949a6f6e0699ef2935d2d7c06ea006e3b201c52666e07`
`307d9cefa7a3147eb78c69eded273e47c08df44c2004f839548963268d19dd87`
`7a1554383345f31f3482ba3729c1126af7c1d9376abb07ad3ee189660c166a2b`
Network Indicators (Refanged)
`hxxps[://]ptb.discord[.]com/api/webhooks/1360401843963826236/TkFvXfHFXrBIKT3EaqekJefvdvt39XTAxeOIWECeSrBbNLKDR5yPcn75uIqKEzdfs9o2`
`hxxps[://]ptb.discord[.]com/api/webhooks/1360259628440621087/YCo9eVnIBOYSMn8Xr6zX5C7AJF22z26WljaJk4zr6IiThnUrVyfWCZYs6JjSC12IC8c0`
Remediation & Recommendations
Terminate & Purge
Immediately kill any unrecognized Python or Discord-related processes. Navigate to and delete any suspicious executables or shortcuts.
`%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup`
Clean Discord Install
The malware modifies the core files of the Discord client. You must completely uninstall Discord, ensure the folders are deleted, and then reinstall a fresh copy.
`%LOCALAPPDATA%/Discord` and `%APPDATA%/discord`
Credential Reset
Discord
Reset your password immediately. This invalidates the stolen token.
Browsers
If you saved passwords in your browser, consider them compromised. Reset passwords for all affected accounts, prioritizing email and banking. Enable Multi-Factor Authentication (MFA) everywhere.
Session Invalidation
Log out of all active sessions for critical services to ensure the attacker cannot use stolen session cookies.
External Technical Research
DeepCode
"Investigating VVS $tealer: A Python-Based Discord Malware" (decode cyber crime[.]com)
Cited in the Unit 42 report for operational investigation details
SANS Internet Storm Center
"Obfuscated Malicious Python Scripts with PyArmor" (isc.sans[.]edu)
Diary entry discussing the rise of Pyarmor in malware.