MalwareBazaar Database

This page shows some basic information the YARA rule INDICATOR_SUSPICIOUS_Go_Infostealer_Discord_Generic including corresponding malware samples.

Database Entry


YARA Rule:INDICATOR_SUSPICIOUS_Go_Infostealer_Discord_Generic
Author:Yara Rule Generator
Description:Detects a Go-based infostealer that targets Discord tokens by locating the 'Local State' file, decrypting the master key with DPAPI, and exfiltrating tokens.
Firstseen:2026-04-15 11:21:11 UTC
Lastseen:2026-04-15 11:24:19 UTC
Sightings:3

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter