MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ba45be16a87eddd92d71282f61fcd380646736aac1e913c62ce974e99a953ad2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiscordTokenStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: ba45be16a87eddd92d71282f61fcd380646736aac1e913c62ce974e99a953ad2
SHA3-384 hash: f2b8c5e3892d206d0e56748ad23c2b26153b0e563f37bf625a59ecceeabc148b0c4358820d88e7532483597c48672cf6
SHA1 hash: 4fd1863be7c837cbae90896b4aa401a474e9163d
MD5 hash: ba4cfeb29c30566f0bb9f0e54763d2c6
humanhash: maryland-muppet-illinois-salami
File name:ba4cfeb29c30566f0bb9f0e54763d2c6.exe
Download: download sample
Signature DiscordTokenStealer
File size:1'526'272 bytes
First seen:2025-03-01 13:26:53 UTC
Last seen:2025-03-01 14:53:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:Xp6GKnxa3WMvaJeGPFgScs45vHsrVUwZ7oqK9gROfDdNXIFwiAasM6ULUoktC9D:UG2xamd/cvfYVUwZ9ROpxI8jM65zY9
TLSH T11E65239627D5D524D0251D35C2BBD393A272B002A942CF8B3F8F378BAD3A781EE525D1
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 71e0e4b8cccccc60 (1 x DiscordTokenStealer)
Reporter abuse_ch
Tags:DiscordTokenStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
417
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
himresearch.exe
Verdict:
Malicious activity
Analysis date:
2025-02-26 20:54:57 UTC
Tags:
loader opendir purecrypter purelogs stealer susp-powershell

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Creating a file
Stealing user critical data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
net_reactor obfuscated obfuscated packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Discord Token Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Discord Token Stealer
Yara detected Generic Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.AsyncRAT
Status:
Malicious
First seen:
2025-02-27 00:16:36 UTC
File Type:
PE (.Net Exe)
Extracted files:
18
AV detection:
18 of 24 (75.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
outlook_office_path
outlook_win_path
Browser Information Discovery
System Location Discovery: System Language Discovery
Accesses Microsoft Outlook profiles
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
ba45be16a87eddd92d71282f61fcd380646736aac1e913c62ce974e99a953ad2
MD5 hash:
ba4cfeb29c30566f0bb9f0e54763d2c6
SHA1 hash:
4fd1863be7c837cbae90896b4aa401a474e9163d
SH256 hash:
86be09d36b096c989d19340c06a8cae488974ce552f1cd2aaf939729bd5c921c
MD5 hash:
fb611ecf87ee7d41289ca27a7a324f27
SHA1 hash:
028f87aafb6b1197494b63298acf8bb88b38d7d2
SH256 hash:
dcb8ad2ae2463565489f0fffeea55898d90e3f98ba9f91fb9d3a1a38c5a70231
MD5 hash:
d14024c1ed3c895836d7587e30423794
SHA1 hash:
034699203df4d46842dae1b8a3cbbc0374fdb52c
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
73e3359b2a1fc92642b96a30d52044304621c8df619f7dcce8739f52beb97dce
MD5 hash:
e00b22b5af750dfc1934f513d67b7752
SHA1 hash:
277e8b8ee8c678dad4a3c19d2478d3d43d510e3f
SH256 hash:
adb9b74b1d3653adc2c00c0c227b4bb37334bcf673d362d62a25e7dd431a7d29
MD5 hash:
730ee56124e16a88da6bf4eaf7e2c750
SHA1 hash:
2de814edfeca91e2d7d9c51dd7b8857f9d88a6ce
SH256 hash:
b990d2e43d386602a84aad90ccd412a248ab09f6f70385a7bd79ce0b4486b498
MD5 hash:
b0ca0d6734eb7af44e7b863c42ed586e
SHA1 hash:
60246f32eaef31e7e696500294d218ac62e8815d
SH256 hash:
cd040782177c4d745e2b90b20ed3d067246bdec0c84bb31367ac2621e890b019
MD5 hash:
101bd263af098d3a21da7b7b19493542
SHA1 hash:
73281e7b895f7f542e3fac17dc51beece559ca10
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DiscordTokenStealer

Executable exe ba45be16a87eddd92d71282f61fcd380646736aac1e913c62ce974e99a953ad2

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments