Discord Malware - "i hacked MYSELF??"

Поделиться
HTML-код
  • Опубликовано: 20 мар 2021
  • To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link)
    For more content, subscribe on Twitch! / johnhammond010
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    PayPal: paypal.me/johnhammond010
    E-mail: johnhammond010@gmail.com
    Discord: johnhammond.org/discord
    Twitter: / _johnhammond
    GitHub: github.com/JohnHammond

Комментарии • 489

  • @_JohnHammond
    @_JohnHammond  3 года назад +378

    For the frenzy of folks that are concerned YoOuUUuU LLEeeEAAaKKEEDdA TOOKKkKEKEENNNNN!N!N!N!!nn1n1hhbjgngn:
    No. If you got clever and looked at individual frames, the one you see returns an Unauthorized. Others have been obscured.
    Thank you for your concern. :)

    • @castles990
      @castles990 3 года назад +12

      Very nice video

    • @DoorThief
      @DoorThief 3 года назад +16

      I feel like I was called out on this, lol

    • @nikolanojic6861
      @nikolanojic6861 3 года назад +3

      Dosent tokens change with time

    • @XenorioWasTaken
      @XenorioWasTaken 3 года назад +16

      If you stitch together the frames where the working token is visible, you can make out about half of a token. Just to be sure, i would advise changing your password as that generates a new authentication token and invalidates the old one. You wouldn't even have had to blur any tokens if you did that before releasing the video.

    • @_JohnHammond
      @_JohnHammond  3 года назад +44

      Yes, passwords were changed before releasing the video ;)

  • @jamesoneill2606
    @jamesoneill2606 3 года назад +448

    Please don't stop explaining the simple stuff, I've learned loads thanks.

    • @Khusyasy
      @Khusyasy 3 года назад +1

      same

    • @ajayk643
      @ajayk643 3 года назад

      Then why did you see these kind of videos

    • @ajayk643
      @ajayk643 3 года назад

      John Hammond thanks for this video😍😍

    • @trouty7947
      @trouty7947 2 года назад +4

      It's good to remember every video, especially when they're popular, will have a lot of new people that this is literally their first in depth look at malware analysis. So it's always worth explaining for the new guys.

    • @oltn7142
      @oltn7142 2 года назад +1

      same here

  • @flightstatic4662
    @flightstatic4662 3 года назад +277

    I don't think I have ever heard anyone say "please send me malware" before

    • @ko-Daegu
      @ko-Daegu 3 года назад +2

      it's all over Twitter if you follow at least one malware analyst

    • @recommendastra_hack_zoneon709
      @recommendastra_hack_zoneon709 3 года назад +2

      A ban was placed on my Ticktok, PSN account which affected my score but all Thanks To #global_hackweiser1 i got all access to my banned accounts within some minutes which i summon the trust to work with him after i saw most of his good recommandations on You-Tube. You trully a Man of your word.💯

    • @recommendastra_hack_zoneon709
      @recommendastra_hack_zoneon709 3 года назад +2

      A ban was placed on my Ticktok, PSN account which affected my score but all Thanks To #global_hackweiser1 i got all access to my banned accounts within some minutes which i summon the trust to work with him after i saw most of his good recommandations on You-Tube. You trully a Man of your word.💯

    • @tamilxctf4075
      @tamilxctf4075 3 года назад +5

      @@recommendastra_hack_zoneon709 y spam.exe

    • @bitten2up
      @bitten2up 2 года назад

      tbh I said that to someone who was infected with this malware so then I can report the links

  • @xFalduR
    @xFalduR 3 года назад +99

    I'm only 5 minutes in, but i feel its relevant to say I appreciate the "easy baby stuff" being reiterated for people like me. I'm learning python for data science. I don't know what all of these imports do. So when you explain every import or at least give basic descriptions of what they do, it really helps me follow along.

    • @JonSnyderfudge
      @JonSnyderfudge 3 года назад +4

      Lol yup. Never assume our knowledge base. Those that already know python can easily skip forward that part if they want.

    • @cedricvillani8502
      @cedricvillani8502 2 года назад +1

      Ok well lol, if your actually learning python you KNOW what import does. Lmao think about the word for a moment…… hmmm do a little work looking up maybe? No? Just wait for someone to do it for you?

    • @xFalduR
      @xFalduR 2 года назад +6

      @@cedricvillani8502 not only are you pretentious, you also can't read. That's astounding.

    • @issecret1
      @issecret1 2 года назад +3

      @@cedricvillani8502 yes. Feel free to lose your mind over this fact

    • @shawazonfire
      @shawazonfire Год назад

      Well said, I think that's probably the reason I like this guy's videos. Clear, comprehensive step by step instructions and explanations.

  • @davidfrischknecht8261
    @davidfrischknecht8261 3 года назад +123

    That ".il" file is actual CIL (Common Intermediate Language, formerly known as MSIL) code that C# and VB source code files are compiled down to before they're turned into executables.

    • @nimitzufo94
      @nimitzufo94 3 года назад

      thanks man

    • @THEbraylonbarnes
      @THEbraylonbarnes 3 года назад +1

      thanks david frisk neck

    • @yeppiidev
      @yeppiidev 2 года назад

      @@THEbraylonbarnes lmaoo

    • @rogogo1244
      @rogogo1244 2 года назад

      @@THEbraylonbarnes Its german: David Fresh-Knight

  • @MrTubeMeToo
    @MrTubeMeToo Год назад

    Thanks for making it 'approachable'. I am a beginner in all of this and your quick description of the basic commands is extrememely helpful. It allows me to continue to follow what you are doing and also learn about a wide variety of commands. Of course, further real study is necessary but your presentation helps one broaden understanding of the overall field to be studied. Thanks.

  • @MsThekiller02
    @MsThekiller02 2 года назад

    Learning new stuff with you is always great. You always manage to draw my attention for a whole hour.

  • @matthewlandry1352
    @matthewlandry1352 3 года назад +26

    Omg..can’t wait for this I started seeing a lot of discord trojans in the news last year and I would love to here more in depth analysis.

  • @nv_takeout
    @nv_takeout 2 года назад +1

    Recently stumbled upon some of your malware analysis videos and boy am I hooked! love your approach, you make things super easy to understand even for someone with little to no coding knowledge. I hope soon I can find some videos on your channel about learning to program in some of these languages that you work in with malware :) some more gamer-catered stuff would be awesomeee too! thanks John for some very entertaining videos!

  • @wtfdoiputhere
    @wtfdoiputhere 2 года назад

    Honestly I've not watched a full malware analysis vid from you but this one rly interesting and honestly very well written

  • @DoorThief
    @DoorThief 3 года назад +1

    Love your content, John! It's really fun to step through code with you.

  • @Marten..
    @Marten.. 3 года назад +2

    one of your most easy to understand videos yet. well explained. learned a lot. thank you John!

  • @highvisibilityraincoat
    @highvisibilityraincoat 3 года назад +66

    This will blow up. So many script kiddies on DS

    • @_JohnHammond
      @_JohnHammond  3 года назад +44

      I tried to make this as cl1ckb@!t as possible 😎

    • @JarredRandom
      @JarredRandom 3 года назад +8

      @@_JohnHammond i think youve succeeded in making it that

    • @JimTheScientist
      @JimTheScientist 3 года назад +4

      I see them every day. Lots of the exploits people use “generators” for (python scripts you can find on GitHub) are electron related. So many ways to download files to other people’s computers and to crash other people’s computers.

    • @JarredRandom
      @JarredRandom 3 года назад +1

      @@JimTheScientist lol hey jim, fancy seeing you here!

    • @highvisibilityraincoat
      @highvisibilityraincoat 3 года назад +5

      JimTheScientist electron is a shit piece of software and I wish permanent annoyance on its devs and applications that use it. should not crash because of a video codec issue

  • @Nitradoz
    @Nitradoz 3 года назад +2

    200k! good job man you deserve it :)

  • @evinces
    @evinces 3 года назад +1

    Omg, we need to see more of this hog stealer code and whatever else you can find in the land of Discord malware! Keep up the great work and congrats on 200k!

  • @kylelarson7840
    @kylelarson7840 3 года назад

    Hey John a little off topic for this video, but your terminator vid, (among all the others!) really helped me pass the eJPT in less than 4 hours last week. Thanks for all great content man!

  • @joeymelo2882
    @joeymelo2882 3 года назад

    Great content! Thank you for your contribution and for taking the risk of exposing yourself. Very informative.

  • @jonoisedev
    @jonoisedev 3 года назад

    I literaly saw this on my youtube feed and inmediately went to make popcorn!!

  • @superpowerforhire
    @superpowerforhire 3 года назад +20

    This is much better, John. You’ve dissect each components and explained thoroughly. Rather than rushing always.

  • @Basieeee
    @Basieeee 3 года назад

    I Love you John. Great video again, interpreted languages is cool to reverse. Congratz on the 200k :)

  • @aravbudhiraja
    @aravbudhiraja 3 года назад

    ayy congrats on 200k John!

  • @Kurowe.
    @Kurowe. 2 года назад +2

    I hope more of you guys look into this Discord malware, a lot of this stuff is going undetected and creating a lot of headaches and some of these stealers have keyloggers, gets login sessions from your browsers etc.

  • @lethalboar6755
    @lethalboar6755 3 года назад +5

    Great video John, would love to see you de-obfuscate that JavaScript!

  • @omniflas_2065
    @omniflas_2065 Год назад

    I love these kind of videos, fun new channel to nerd out to. :) Joined the Discord as well! :p

  • @driden1987
    @driden1987 3 года назад

    Awesome content as always, John 👏🏻

  • @elthxr4692
    @elthxr4692 3 года назад

    You're making it happen John ! :) BigUps . Learned lot from you my Guy !! Hopefully more to come. Peace

  • @andyburton5912
    @andyburton5912 3 года назад +1

    Was doing exchange patching a week ago and they reference @john Hammond gist love it

  • @jaygeemmo
    @jaygeemmo 3 года назад

    ive learned allot from this and that says something because time enrolled in college for this and I feel like these breakdowns help immensely for someone like myself.

  • @randallsalyer
    @randallsalyer 3 года назад +1

    You always have great videos!

  • @alincraciunescu
    @alincraciunescu 3 года назад

    You are the best! Thank you for explaining also for the beginners.

  • @apollogeist8513
    @apollogeist8513 3 года назад

    Congrats on 200k!

  • @djoser4977
    @djoser4977 2 года назад +1

    THC For (4) L(ife)
    9-TetraHydroCannabinol (THC) is a chemical component in Weed and Hasj.
    Probably a smoker.
    nice vid btw, Learned a lot!

  • @jonny-mp3
    @jonny-mp3 3 года назад

    Hey John, love the Malware stuff. Would love to see some Dynamic Analysis with some ransomware or something , cheers

  • @rahealmazumder6811
    @rahealmazumder6811 3 года назад

    Great video John! Many thanks :-)

  • @keissetje
    @keissetje 3 года назад +6

    Holy smokes, how can it be so easy to retrieve all your discord data without logging in essentially. I wouldn't have guessed that discord is saving these tokens as plaintext in your appdata folder. Very nice video! You've got another sub :)

    • @ayva1106
      @ayva1106 2 года назад +1

      Late comment, but they're finally releasing a beta tests that encrypts your tokens... and it only took them a few years

    • @MakotoIchinose
      @MakotoIchinose Год назад +1

      @@ayva1106 And even then it's still compromised. People found out malware that circumvented it and managed to reverse engineer it for documentation.

  • @krlst.5977
    @krlst.5977 3 года назад

    Great video, man. As always :)

  • @bryanvuyk
    @bryanvuyk 3 года назад +1

    Seriously the best content creator out there. Love the videos. Keep them coming.

  • @shawazonfire
    @shawazonfire Год назад

    i'm not gonna lie to you bro, the way you teach is excellent and i appreciate your videos more than you could ever imagine... ever...

  • @jdbjdb2
    @jdbjdb2 3 года назад +7

    The delay is to prevent maxing out discord API requests so it's maximum efficiency

  • @crazymonkeyVII
    @crazymonkeyVII 2 года назад

    Absolutely fantastic content!

  • @rabbitear0
    @rabbitear0 3 года назад

    Great Video, and learned a bunch!

  • @shivashiva8021
    @shivashiva8021 3 года назад +10

    I am eagerly waiting .

  • @JimTheScientist
    @JimTheScientist 3 года назад +26

    This is going to be interesting. I’ve studied RCE attacks and Trojans on discord, as well as some more tame malware. I can say that discord is really bad in the security area, but it’s not much to worry about as there are few people who know how to do the attacks and how they work.
    Edit: I’ve started watching the video, and I’ve seen almost this exact same script before while moderating a server

    • @Odsku
      @Odsku 3 года назад +6

      More advanced scripts add malicious js to discord core modules it allows the malware to keep persistence while having a low detection rate

    • @DM-qm5sc
      @DM-qm5sc 3 года назад

      That's ok, only a few people know how these attacks work

    • @Odsku
      @Odsku 3 года назад +1

      @@DM-qm5sc only the RCE are private but the scripts are well public

    • @tlocto
      @tlocto 2 года назад

      oh hey jim fancy seeing you here

    • @JimTheScientist
      @JimTheScientist 2 года назад

      @@tlocto hello

  • @hubsoftecommerce
    @hubsoftecommerce 3 года назад +1

    cant wait for 200k so excited !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @Kemankes111
    @Kemankes111 3 года назад

    Awsome video man. I appreciate it a lot

  • @Koszilla
    @Koszilla 3 года назад

    This is going to be an amazing video!

  • @sentinalprime8838
    @sentinalprime8838 3 года назад

    amazing content john

  • @marckerkvliet2999
    @marckerkvliet2999 3 года назад

    Great video!

  • @Enigmahax
    @Enigmahax 3 года назад

    really good explication, please keep this up

  • @syrefaen
    @syrefaen 3 года назад

    Oh its a fun series keep it up!

  • @charismaticmedia8585
    @charismaticmedia8585 3 года назад

    Love your videos sir .Hope you have a great day.

  • @algalib2631
    @algalib2631 3 года назад

    YOUR explanation is Osm!!!🖤🖤🖤

  • @ajayk643
    @ajayk643 3 года назад

    Thanks for this video sir

  • @vittthevecc1390
    @vittthevecc1390 3 года назад

    This seems very intresting. Can't wait to see it

  • @TehIdiotOne
    @TehIdiotOne 3 года назад

    By no means the most advanced malware i've seen, like it does rely on a lot of user error to work, but still nice breakdown

  • @dommbrown
    @dommbrown 2 года назад

    Love ya work chap! Sub'd

  • @tocraft573
    @tocraft573 3 года назад +40

    Props to this guy managing to get a discord nuker/token logger to 1 hour

    • @aty4282
      @aty4282 3 года назад +7

      @@recommendastra_hack_zoneon709 hope it gets banned again, tiktok does not deserve users

    • @IkeVoodoo
      @IkeVoodoo 3 года назад

      @@aty4282 Its a bot, he is so shit and one of the worst people ngl (the person running the bot)

    • @aty4282
      @aty4282 3 года назад

      @@IkeVoodoo goddamn, cant believe that i fell for the classic ones

  • @cassandradawn780
    @cassandradawn780 3 года назад +76

    by the end of the premiere you're gonna have 200k.

  • @acticfl
    @acticfl 3 года назад

    I was thinking if i should like this video - then you pointed out your TLOZ shirt. You win

  • @dedkeny
    @dedkeny 3 года назад

    I thought it was clickbait, but DAMN!! legit content

  • @WeirdDuck781
    @WeirdDuck781 3 года назад +1

    If you open the webhook URL you can identify the name of the webhook, the Guild ID and Channel ID. That information is kinda basic but might help when reporting to Discord

  • @NevRS32
    @NevRS32 2 года назад

    51:50 Hammond enters the freaking Matrix... xD You know a content creator is entertaining when you don't understand shit, and still watches until the end, entertained!

  • @picardftw1313
    @picardftw1313 3 года назад

    yikes. .. follow up on what more you learn about this for sure lol.
    dropped a like. already subbed.

  • @dtvdavid
    @dtvdavid Год назад

    Instant pressed like, as I saw the Triforce. :)

  • @Haroon_abbasi
    @Haroon_abbasi 3 года назад

    happy 200k

  • @aalekhmotani3877
    @aalekhmotani3877 Год назад

    you are genius, you are exceptional tutor, thank you, thank you so much, i got a project idea from this vid.

  • @falcongamingdev8810
    @falcongamingdev8810 3 года назад +1

    that sever crasher is probably allowing the person to join servers and spam the server with that users token

  • @JonSnyderfudge
    @JonSnyderfudge 3 года назад

    Looked like that first sketchy website at 33:50 was a peertube instance. It was probably a community dedicated for malware videos.

  • @DoorThief
    @DoorThief 3 года назад +3

    I definitely want to see your deobfuscuate that js code :D

  • @hk5716
    @hk5716 3 года назад +1

    it could be the location for discord tokens in those browser since discord uses electron which uses chromium which chrome and a lot of other browsers also use, so it might be that cookies are stored there.

    • @KnightOfEvil
      @KnightOfEvil 3 года назад

      The path has leveldb which is a nosql db where chromium stores it's cookies and local storage

  • @buleini
    @buleini 3 года назад +14

    Ok, seeing this premiere I think I can do two unfair bets right now. 1. Bet I'm subscribing here. 2. There's something malicious on my son's PC.

    • @IkeVoodoo
      @IkeVoodoo 3 года назад

      Depends if he downloaded it...

  • @DZ-lm4le
    @DZ-lm4le 3 года назад

    you have a new sub
    keep it up.

  • @vgarzareyna
    @vgarzareyna 3 года назад

    John! Do the thing!

  • @Car777777777
    @Car777777777 3 года назад

    yes i am interested in more discord stuff
    and yes it is bad, but it's good to see and know what is actually out there

  • @EddiePenta
    @EddiePenta 3 года назад

    I believe it is grabbing also grabbing Chrome, Opera and Brave tokens. The file structure generated by get_tokens seem to also work for those other directories listed

  • @buleini
    @buleini 3 года назад

    I don't mind you ending this one on sort of a cliffhanger. I thought to myself, I have Discord but I don't have a Python installation. I remembered I specifically installed Perl (yeah not Python) for Blender, and then I searched for Python on my machine. Python comes with a lot of programs ( I have ones for Blender, GIMP 2, Inkscape, LibreOffice, Visual Studio Community Edition ..... and in Windows Apps?? What The ?) This developer dad does not install a default extension handler without blinking at least once, but it seems the Python script is not as harmless if you accepted to automatically open .py files??

  • @KriTixXPlayer1
    @KriTixXPlayer1 Год назад

    Hey! Can u make a list of all the malware you have explored so far, making we all can send unique malware programs

  • @TheHyperplayer
    @TheHyperplayer 3 года назад +10

    I would advise you to use solid colored bars instead of pixelation since there is currently a promising tool in development that can reverse pixelation to some extend.

    • @eericjacobson
      @eericjacobson 2 года назад +3

      hollywood isnt real bro

    • @LuciSheppy
      @LuciSheppy Год назад

      Reversing pixelation requires context and information, now I haven't actually seen the pixelated part in this video but unless the pixelated content is unambiguously readable as any character, an algorithm won't know either, I bet you'd be able to get an approximation of what it could look like but that may just be as unreadable as it already is, but less pixelated

    • @lonelyanthem
      @lonelyanthem Год назад

      @@eericjacobson neural networks exist, and they've been in use for years.

  • @LokiCDK
    @LokiCDK Год назад

    Oh wow! I'm impressed.
    Only importing that actually used functions, not the whole libraries.

  • @funguslars
    @funguslars 3 года назад +10

    I love how the token stealer disguises as a token stealer 🤣

  • @Deralica
    @Deralica 3 года назад +1

    54:55 I was kind of expecting a "it's bad mmmkay?"

  • @Xn4W
    @Xn4W 3 года назад

    Are you using Whonix for your malware analysis sandbox? I saw a glimpse of the Whonix desktop (little mouse and blue background) and recognized it, so I'm assuming your Virtualbox session is a Whonix VM?

  • @hypedz1495
    @hypedz1495 2 года назад

    ah yes.. john.. john hammond does it again.

  • @dieSpinnt
    @dieSpinnt 3 года назад

    Sometimes you make me really nervous, John.
    No, not the tokens, the clumsiness in the shell:P
    echo %LOCALAPPDATA% ... or cd %APPDATA% jFYI
    But never mind, thanks for the video :)

  • @xRioHD
    @xRioHD 3 года назад +13

    This is the new script kiddy stuff. Back when people just went around ddosing people for fun in online games, now the kiddies try to steal your discord payment info.

  • @Jade_3375
    @Jade_3375 3 года назад

    As someone who works with the discord api it's scary how easy it is to get information with a token

    • @roottokyo
      @roottokyo 3 года назад

      It’s also scary to notice how soo much information including cached payment information is in the OVERLAY_INITIALIZE payload.

  • @nanvinor
    @nanvinor 3 года назад +1

    Do you prefer Virtual Box over Hyper-V manager or other softwares? And if you have some spare time, I would love to know the reason behind your choice of Virtualization software! Kind regards.

  • @the2dstuart
    @the2dstuart 3 года назад +1

    been wondering about discords security for a while now... this should be good

    • @Odsku
      @Odsku 3 года назад

      Discord is not focused on security if u want maximium security while using discord u should use an very lite version of discord such as discord-cli its not the best nor does it support voice calls but it is very secure as it does stores the token in memory and rce exploits should be near impossible

  • @HomelessDeamon
    @HomelessDeamon 3 года назад

    Yooo Hammond cool haircut 👌

  • @GodBurstPk
    @GodBurstPk 2 года назад

    Very nice video, wants me to create on myself (for knowledge purposes ofc, mayby will sent you a link once i do ':) )

  • @lucasedkins2095
    @lucasedkins2095 2 года назад

    I liked at the Zelda shirt. Thanks!

  • @mehmetedex
    @mehmetedex 3 года назад

    I am entertained way more than watching LiveOverflow

  • @kobiassvilli
    @kobiassvilli 3 года назад

    I think the references to Chrome Opera etc is not the malware looking for passwords within these programs as I'm sure Chrome stores you saved passwords encrypted, but it is probably looking for the Discord tokens saved in Chrome for auto login / cookies

  • @Jack-zr4kc
    @Jack-zr4kc 3 года назад

    For the Browsers It takes The Tokens From Them, Because Some People Log into to them. Like you said :)

  • @radomane
    @radomane 3 года назад +2

    I'm pretty sure the password cache of Chrome etc. uses your Windows user creds to encrypt the passwords, so accessing them would at least require some user action.

    • @IkeVoodoo
      @IkeVoodoo 3 года назад +1

      nope, Chrome uses window's CryptUnprotecData() if i remember correctly (i believe it is from windows.h file).

    • @radomane
      @radomane 3 года назад +1

      Yeah nvm, as long as you are signed in you can call CryptUnprotecData, and dumping the passwords can easily be done in python, lol.

  • @snafulegend6689
    @snafulegend6689 Год назад

    APPDATA/LOCAL is where almost all apps store personal user information. Idk why I never see a loop through all folders there.

  • @SintaxErorr
    @SintaxErorr 3 года назад

    you can get the user data as well from walking through the code when you send a message. it requests all that for all the other people on the server you are on

  • @narayanyadav8591
    @narayanyadav8591 3 года назад

    thank you posting a topic of choice.

  • @Kaenguruu
    @Kaenguruu 2 года назад

    This is really scary, especially if you think about how such a simple script can steal all your data in literal seconds .-.

  • @javajav3004
    @javajav3004 3 года назад

    @28:29 THC4L as in Weed for Life lmao