This Python script is a Windows-only, heavily obfuscated infostealer. On launch it aborts on non-Windows hosts, then: • Fingerprints the machine (hostname, username, local/public IP via api[.]ipify[.]org, hardware IDs via registry/WMI, CPU/GPU, RAM, disk serials/usage) • Harvests Discord tokens and account metadata from the Discord desktop client plus Chromium-based browsers and Firefox, injecting JS into Discord's code to trap logins, gift codes and payments • Extracts saved passwords, cookies, browsing/download history and credit-card data from Chrome, Edge, Brave, Opera variants, Yandex, Firefox, etc. • Grabs Roblox .ROBLOSECURITY cookies and account info via browser_cookie3 and the Roblox API • Decrypts desktop crypto-wallets (MetaMask, Binance, Coinbase, Trust Wallet, Exodus, Atomic, etc.) using AES/GCM with DPAPI-unwrapped keys • Captures a full-screen screenshot and a webcam photo • Disables Task Manager via registry and poisons the Windows hosts file with hundreds of AV/security domains • Persists by copying itself into the user's Startup folder. Finally it zips all stolen data, uploads it to gofile[.]io, notifies the attacker via a hard-coded Discord webhook, and tags IPs via redtiger[.]shop. It also contains built-in JavaScript injection to further compromise the Discord desktop client and can auto-purchase Nitro via stolen payment methods.
Live on PyPI for 32 minutes before removal. Socket users were protected even while the package was live.