UNDETECTED Discord MALWARE | Reverse Engineering Duvet Stealer, Electron Malware Used By HACKERS

Поділитися
Вставка

КОМЕНТАРІ • 110

  • @CyberDevilSec
    @CyberDevilSec 5 місяців тому +37

    For a second i thought you were Jhon Hammond XD.
    I love how this is so in depth you got a new sub

    • @cyberraiju
      @cyberraiju  5 місяців тому +8

      Hahaha, this wouldn't be the first or last time it happens 😅
      Thankyou for the kind words and sub! ❤️

    • @yaboy7120
      @yaboy7120 5 місяців тому +1

      ME TOO

    • @Sweettreats23
      @Sweettreats23 5 місяців тому +1

      This isn't John Hammond??!

    • @CyberDevilSec
      @CyberDevilSec 5 місяців тому +1

      @@cyberraiju Hey thanks for replying :D
      I actually have a really big desire to also become a teacher on UA-cam.
      And believe me when i say this 2 years i could not controlled some situations as a result still 0 videos....
      I hope maybe we can get in touch

  • @radoslavdimitrov7505
    @radoslavdimitrov7505 5 місяців тому +1

    This is insane. Awareness needs to be raised. Thank you for your video

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      You are most welcome! Glad you learned something new!

  • @theikeamafia1347
    @theikeamafia1347 5 місяців тому +8

    Just wanna say it's a very good video because you just managed to make me focus during a malware analysis which is quite rare. You explained everything very well and in detail so thanks and you just got a new sub :)

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      Thankyou! I just want to say that your YT name made me laugh 😂 👏 bravo.
      Greatly appreciate the kind words, feedback and sub 😁

  • @YadraVoat
    @YadraVoat 5 місяців тому +6

    Academically interesting, but the foremost problem there would be Microsoft Windows. And Discord. It's not like the data sent using Discord is safe at all. But at least running something like a Flatpak of a web-version Discord client provides some kind of sandboxing.

    • @cyberraiju
      @cyberraiju  5 місяців тому +2

      Unfortunately due to the support and ease of use, Microsoft Windows and Discord remain the dominant operating system and software of choice for gamers.
      That being said, I believe if the roles were reversed we would still begin to see creative ways of doing this against alternative operating systems and software setups.

    • @mystica-subs
      @mystica-subs 5 місяців тому

      If someone just uses discord in the browser, not as the electron app, is this still a problem?

  • @bin_jets
    @bin_jets 5 місяців тому

    This is my first time on you channel and realy love the job and content.
    You get a new one in your Jai Minton house

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thankyou! It's always great to hear when someone new takes a chance on a video I've done and winds up enjoying it. Welcome!

  • @o_kamaras
    @o_kamaras 5 місяців тому +6

    16:50 Wait a second, I recognize that string!
    Hint: it's a youtube video ID

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      Wow 😮 you're right 🤣
      Maybe this is a default token regex in whatever was used to build the malware as an Easter egg and they forgot to change it, or it's an egg by the malware author.
      Either way you win the internet today for picking up on this! 👏🔥

    • @taahaseois.8898
      @taahaseois.8898 5 місяців тому

      @@cyberraiju It's not related to the malware in any way. It's used by Discord for their authentication tokens and the functionality related to saving them in a some-what secure manner.

  • @CuteSkyler
    @CuteSkyler 5 місяців тому +1

    The line at 16:50 weirdly enough is the UA-cam video ID of Rick Astley's Never Gonna Give You Up.

  • @RhinoGeee
    @RhinoGeee 4 місяці тому +1

    Came across this video because i just got hacked. They impersonated someone i knew and said something about a game to try and comment. I was stupid enough to download it. Stupider not suspect anything. This video at least told me what they could have access to or what they did get access. Since everything was token they only had a one time access. I since have reformatted my pc and changed all my passwords to what i thought they might have access to. But it was very stressful and scary.
    I came across this video cause the hackers tried sending me screenshots which showed my info. But also the program duvet they used.
    Good video. Stay safe everyone

    • @cyberraiju
      @cyberraiju  4 місяці тому

      Oh no, I'm so sorry this happened to you!
      Glad you could respond and get it under control ❤️

  • @likeastar20
    @likeastar20 5 місяців тому +1

    Great video and easy to understand

  • @viveklion
    @viveklion 5 місяців тому +2

    Similar to BBY stealer.

  • @the_broz
    @the_broz 8 днів тому

    It seems like they updated this or there is a new variant called hexon, operates almost the exact same way but now it way more obfuscated.

  • @taahaseois.8898
    @taahaseois.8898 5 місяців тому +1

    12:44 is not the part where the token is stolen. Instead your discord instance is modified to launch the malware again.

  • @amateurprogrammer25
    @amateurprogrammer25 5 місяців тому +2

    This video has been a wake up call. I could've been infected by this and would've had no way of knowing. I need to get clean up my opsec act, STAT!
    Thanks for a great in-depth analysis!

    • @cyberraiju
      @cyberraiju  5 місяців тому

      No worries at all! Glad I could help and shine some light on this!

  • @chiragartani
    @chiragartani 5 місяців тому

    Awesome. Thanks a lot.
    Just a feedback - If you open analytics of any video through UA-cam studio, you will find that mobile and desktop both users watches the videos. So from the next time please try to zoom more on the display so content gonna be perfect for all.
    Example: John Hammond's videos.

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      Thanks a bunch! The irony is these analytics are hidden on mobile so I couldn't see them. I can see them now and will keep this in mind for future videos. Cheers!

    • @chiragartani
      @chiragartani 5 місяців тому

      @@cyberraiju thanks 😃

  • @nezu_cc
    @nezu_cc 5 місяців тому +1

    Jhon Hammond v2? Nice, that's a sub.
    This is done in a very minimal way, only the malware and nothing else, but since the app.asar file isn't signed you could take any standard electron app that is already trusted, unpack it, inject your malware into one of the legitimate scripts and pack it back together. AVs will have no way to tell other than maybe the installer and runtime monitoring. One of my friends used a similar technique over a year ago, undetected to this day afaik.

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thanks a bunch!
      Yeah anything which requires an interpreter to run will continue to be a thorn for years to come.
      It's a love hate relationship with high level programming languages 😆

  • @februalist4686
    @februalist4686 5 місяців тому

    16:49 they really put a rickroll in malware lmao

  • @1337BR3AK
    @1337BR3AK 5 місяців тому

    pretty cool, again! thanks!

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      No worries at all! Glad you enjoyed it!

  • @chathurangaonnet
    @chathurangaonnet 5 місяців тому +1

    wow Love it ♥.. Thanks for the clear expiations.

  • @Bitcoin274
    @Bitcoin274 5 місяців тому +1

    So cool that you decided to analyze one of my samples! Been tracking the C2s of this malware for a while, writing any YARA rule has been so difficult due to this crazy amount of obfuscation..
    These electron based stealers have been appearing on Telegram lately, and seem to be the same exact malware just with different names.

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Awesome work! Thanks again for sharing this one. I was definitely thinking in the back of my mind some of the ways a Yara rule could be created for it, especially when it's all packed. Are they changing the GUID in the NSIS installer? Or maybe targeting the obfuscation in the electron app itself is the way to go. Definitely a pain.

  • @scalie
    @scalie 5 місяців тому

    This malware seems to be going around by a lot of names but using the same website design and fake game. I saw it under the name of "Planets Therapy" on a video from The PC Security Channel.

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      Thanks for the heads up! I'll have to give it a look over and see what I can find. I think the main issue with naming it after the game it is pretending to be is it means it will probably get lots of different names. If it's based on something in the code itself that's unique or its behaviour it's more likely (hopefully) to be identified no matter what theme it's using in the future.

  • @YadraVoat
    @YadraVoat 5 місяців тому +2

    Impressively good audio for such a small channel.

    • @cold_fruit
      @cold_fruit 5 місяців тому

      15:00 disagrees with you

  • @ViriBurner
    @ViriBurner 5 місяців тому +1

    i was recently a victim of said "sonicglyde" and i have a question if the virus spreads through other drives connected to the infected device?

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Oh no 😯😕
      No, not that I'm aware of because it's very much targeting Discord so replication to a removable device doesn't seem to be a goal or anywhere I've seen in the code.
      That being said I haven't thoroughly gone over the script that appends to an infected Discord instance to see whether that included any logic to spread to other drives.

  • @TbM
    @TbM 5 місяців тому

    14:26 - Interesting how they check for a VM... just by calculating if the total amount of memory is smaller then 2GB. And why does he check the hostname against a blacklist? Just to prevent the virus running on the pcs of his "crew" or "family"? these names look really weird to me...
    And killing debuggers to prevent people reverse engineering his code?

    • @cyberraiju
      @cyberraiju  5 місяців тому

      The hostname check is likely known names used by online sandboxing tools. That way if someone was to upload it to free publicly available tools to perform dynamic analysis it would just exit and not perform the malicious activity which then makes it look clean to the online sandbox.

  • @unenter
    @unenter 5 місяців тому

    Bro I just got hacked by a discord token grabber through an exe think I could have been hacked

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Oh no 😰
      That's not good at all! Guess it may be time to change all your Discord credentials, log out of all Discord sessions and reinstall Discord on your system 😞

    • @unenter
      @unenter 5 місяців тому

      @@cyberraiju yeah I ran malwear bytes but after watching this I feel like I should. Reinstall. But I talked to some other victims of. “ARENA WARS” and they told me only there discord was compromised. But I swear on my lunch I saw a bot for discord. That had that same name in those exe files you where looking in.

  • @BigG9982
    @BigG9982 5 місяців тому

    the hackers update the stub when its get detected......

  • @jazz230
    @jazz230 4 місяці тому

    Dude i got hacked by this, if you want any info on how it was done, maybe we can get in touch

    • @cyberraiju
      @cyberraiju  4 місяці тому

      I'm sorry to hear you had to go through that man 😞
      Feel free to flick me a message if you're on any platform I'm on and can.
      I'm guessing it was a case of someone DMing you on Discord asking to play a new game, or a friend on Discord asking you to which had already been infected? 😬

    • @jazz230
      @jazz230 4 місяці тому

      @cyberraiju yes it was an old freind asking me to test his game, I'll try to contact you

  • @WitherForge
    @WitherForge 5 місяців тому +6

    i got hacked by this virus it was same and everything it even was inside the motherboard

    • @Nine_Divines
      @Nine_Divines 5 місяців тому +6

      🤷‍♀ I'm genuinely curious about what you mean by "inside the motherboard"..

    • @WitherForge
      @WitherForge 5 місяців тому

      @@Nine_Divines there is a msi motherboard vulnerability if you dont enable maximum security its compability mode by default and it could get malware loaded into bios.

    • @cyberraiju
      @cyberraiju  5 місяців тому +9

      The keyword is 'could', but just because Secure Boot wasn't enabled doesn't mean this malware is being loaded inside the bios.
      For that to happen the malware would be dropping other specially crafted files or modifying specific files which then act as Bootkit or Rootkits, and this is a lot more challenging to get right than to just run the malware on your system 🙂

    • @WitherForge
      @WitherForge 5 місяців тому

      @@cyberraiju i dont know if some malware could drop malware into the windows installation usb i create or was it the motherboard

    • @icantcomeupwithnames469
      @icantcomeupwithnames469 5 місяців тому

      ​@@WitherForgeNot technically impossible, but the odds you specifically were targeted by such a sophisticated attack without anyone else raising the alarm is practically zero. You probably just ran something malicious without knowing it was.

  • @DergPH
    @DergPH 5 місяців тому

    just found out about you now

  • @tasosm.380
    @tasosm.380 5 місяців тому +3

    Dollar store John Hammond 😂

    • @cyberraiju
      @cyberraiju  5 місяців тому +2

      Hahahahaha 😂, I'll let him know you said that when I see him at work next.
      I used to get called the 'Wish' version of Ed Sheeran 🤣

  • @gentlemanbirdlake
    @gentlemanbirdlake 5 місяців тому

    For navigating A/B comparisons I highly recommend Beyond Compare, can diff folder trees and compressed formats and even binary so you can drill into the diffs by just clicking what you want to see diffed next.

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      Thanks for the recommendation! Will definitely check it out 😃

  • @mixskillter4785
    @mixskillter4785 5 місяців тому

    I love how in-depth your video is while providing valuable information, very underrated channel, good job Jai!

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thankyou so much for the kind words! I appreciate the feedback and you taking the time to share it with me.

  • @adamhunt429
    @adamhunt429 5 місяців тому

    cheers. Will have to sub on a few accounts :) - I too, initially thought you were Jon hammond at first glance ( the thumbnail) Semi similar features within the same genre. Anywho , good on y!

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thanks a bunch! Greatly appreciated 😃

  • @h.k.a
    @h.k.a 5 місяців тому

    Great work 👏🔥

  • @PainFf007
    @PainFf007 5 місяців тому

    É a tropa do Linn Se tem Duvet Tem Like 🎉🎉

  • @Braindeadly
    @Braindeadly 5 місяців тому

    Awesome

  • @rainbowdoesinfosec
    @rainbowdoesinfosec 5 місяців тому

    This is super interesting! The actor definitely put a lot of time into the front of the malware to make it seem legitimate. Great breakdown of everything. New sub here!

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Absolutely! The juice is obviously worth the squeeze to someone that they're putting in more than your standard effort.
      Thanks for the kind words and the sub!

  • @SolitaryElite
    @SolitaryElite 5 місяців тому

    great video man. subscribed :)

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thanks a bunch man! Appreciate it 👌

  • @DartrIxBTD
    @DartrIxBTD 5 місяців тому

    Awesome video! Your channel is underrated

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thanks so much! As someone who does this on the side for free, it can sometimes be difficult to know if the hours spent are turning into a video others enjoy and learn from or not, so comments like this are definitely valued 😄

  • @hydradragonantivirus
    @hydradragonantivirus 5 місяців тому

    Kaspersky best.

  • @Тарас-щ9с
    @Тарас-щ9с 5 місяців тому

    This is awesome! Thank you! Very informative and useful video ❤

    • @cyberraiju
      @cyberraiju  5 місяців тому

      You're welcome! Thanks for watching. Glad you enjoyed it!

    • @Тарас-щ9с
      @Тарас-щ9с 5 місяців тому

      @@cyberraiju is your channel inspired by John Hammond's? (sorry if you got tired of such questions 😊. I'm sure you will develop your own cool style)

    • @cyberraiju
      @cyberraiju  5 місяців тому +1

      Not really 😅. There's a number of channels which have great content, but it's not really inspired by any one. It is a unique style which is still being fleshed out, driven by my years of experience in both the industry and presenting publicly 😆

  • @dvsur
    @dvsur 2 місяці тому

    John Hammond

    • @cyberraiju
      @cyberraiju  2 місяці тому

      x.com/CyberRaiju/status/1783763199244009949?t=ers3C2pkHA4Fq1aTvPKdzw&s=19 😂

  • @hoangsatfe
    @hoangsatfe 5 місяців тому

    I am from VietNam

  • @YadraVoat
    @YadraVoat 5 місяців тому

    I don't mind technical videos about Windows, but when it comes to security some kind of acknowledgement that this is not a video about an open-source operating system, would be reassuring that you are helping non-technical users who don't know the difference. (Notice I tried to be unbiased by avoiding mentioning which open-source operating systems I prefer to use myself. 😉)

  • @daddy7860
    @daddy7860 5 місяців тому +2

    I appreciate how you explain every step, and especially every assumption and thought process you went through while analyzing this, and the information you used to come to those conclusions; extremely thorough and helpful.

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thanks a bunch! I'm glad to hear that the time spent talking through this analysis and editing the footage wasn't wasted!

    • @daddy7860
      @daddy7860 5 місяців тому

      @@cyberraiju Well, if even one other person learns and gets something from it, it's worth it, isn't it

  • @mr_b_hhc
    @mr_b_hhc 5 місяців тому

    I thought Kaspersky detected it, yet you state it was completed undetected by AV vendors on VirusTotal?

    • @cyberraiju
      @cyberraiju  5 місяців тому +3

      At the time of the video yeah, but if you look at the history and initial analysis it was undetected by all AV vendors.

  • @igboman2860
    @igboman2860 5 місяців тому

    Such clean code from the authors. 😮

  • @RVTGROUP
    @RVTGROUP 5 місяців тому +2

    Keep up the great work! +1 sub 👏

    • @cyberraiju
      @cyberraiju  5 місяців тому

      Thankyou! Greatly appreciated! 😃