MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da94bc09b989972fdcefb35d7e4755d3b39f8509c4c81c0a6c310b67fe2d4347. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiscordTokenStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: da94bc09b989972fdcefb35d7e4755d3b39f8509c4c81c0a6c310b67fe2d4347
SHA3-384 hash: 4f10c0db7d56626f3dcde8ed2a53076977874ad84049273813b3eb132eb4bcfa64812c9ca58d2fd4561bb74c06cd8eb3
SHA1 hash: 57ec3a691a4939fc0a6ca544d2df115d011c95b5
MD5 hash: 43d3c97e221c969543707ce4a075ca8c
humanhash: kitten-illinois-robert-undress
File name:KRYPTON (1).jar
Download: download sample
Signature DiscordTokenStealer
File size:19'835 bytes
First seen:2025-06-10 07:22:11 UTC
Last seen:Never
File type:Java file jar
MIME type:application/zip
ssdeep 384:xrYd1hBR6AykiX++7Pi75frYMmSAflWtHoICdGaaPM3fVk6/:xU/R6AyXh7Po9mTfEkikT/
TLSH T11192E14C398D85EAE8B0637FB4A24359AFB118BC065E6E5746F17ED408340254FF9DB8
TrID 77.1% (.JAR) Java Archive (13500/1/2)
22.8% (.ZIP) ZIP compressed archive (4000/1)
Magika jar
Reporter JAMESWT_WT
Tags:DiscordTokenStealer jar makslove-mavenrat-makslibraries

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
KRYPTON (1).jar
Verdict:
Malicious activity
Analysis date:
2025-06-10 08:48:38 UTC
Tags:
java maksrat rat stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Threat name:
Discord Token Stealer
Detection:
malicious
Classification:
troj.spyw.expl
Score:
88 / 100
Signature
Attempt to bypass Chrome Application-Bound Encryption
Connects to many ports of the same IP (likely port scanning)
Exploit detected, runtime environment starts unknown processes
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Performs DNS queries to domains with low reputation
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Suspicious Processes Spawned by Java.EXE
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Discord Token Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1711750 Sample: KRYPTON (1).jar Startdate: 11/06/2025 Architecture: WINDOWS Score: 88 40 www.mavenrat.xyz 2->40 42 www.makslove.xyz 2->42 44 2 other IPs or domains 2->44 52 Attempt to bypass Chrome Application-Bound Encryption 2->52 54 Yara detected Discord Token Stealer 2->54 56 Connects to many ports of the same IP (likely port scanning) 2->56 60 5 other signatures 2->60 10 cmd.exe 2 2->10         started        signatures3 58 Performs DNS queries to domains with low reputation 42->58 process4 process5 12 java.exe 21 10->12         started        16 conhost.exe 10->16         started        dnsIp6 48 www.makslove.xyz 145.223.100.21, 4034, 4035, 49688 VBA-ASNL Netherlands 12->48 50 dualstack.sonatype.map.fastly.net 199.232.192.209, 443, 49687 FASTLYUS United States 12->50 38 C:\...\downloaded4520252273201814408.jar, Java 12->38 dropped 18 java.exe 19 12->18         started        file7 process8 dnsIp9 46 127.0.0.1 unknown unknown 18->46 62 Found many strings related to Crypto-Wallets (likely being stolen) 18->62 64 Tries to harvest and steal browser information (history, passwords, etc) 18->64 22 msedge.exe 5 18->22         started        24 taskkill.exe 1 18->24         started        26 taskkill.exe 1 18->26         started        28 2 other processes 18->28 signatures10 process11 process12 30 msedge.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        36 conhost.exe 28->36         started       
Threat name:
ByteCode-JAVA.Trojan.Generic
Status:
Suspicious
First seen:
2025-06-07 04:53:42 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
4 of 36 (11.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
credential_access discovery stealer
Behaviour
Enumerates system info in registry
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Drops file in Windows directory
Uses browser remote debugging
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments