This code appears to be malicious and is designed to...
August 29, 2025 at 11:00 PM
This code appears to be malicious and is designed to steal sensitive information from the user's computer. Let's break it into components and examine what it does:
-
Webhook Setup:
- The code defines a URL (
webhookUrl2
) pointing to a Discord Webhook where the stolen data will be sent.
- The code defines a URL (
-
The
send()
function:- This function sends a POST request to the Discord Webhook URL with a given string (usually JSON-formatted content) as the payload.
-
The
paste()
function:- This function sends a POST request containing data to the Hastebin-like service
hst.sh
. If the request is successful, it returns a key that can be used to compose a link to the stored data.
- This function sends a POST request containing data to the Hastebin-like service
-
File System Access:
- The code uses
java.io.File
and environment variables (APPDATA
,LOCALAPPDATA
, etc.) to locate directories and files commonly used by Minecraft launchers or account systems (e.g.,accounts.json
ormicrosoft_accounts.json
from MultiMC, Essential Mod, Feather, and others). - These files may contain sensitive data like user accounts, authentication tokens, or credentials.
- The code uses
-
IP Address Retrieval:
- The code fetches the user's public IP address using the external service
https://checkip.amazonaws.com/
.
- The code fetches the user's public IP address using the external service
-
Pasting Data:
- It calls the
paste()
function on the contents of various files (e.g.,accounts.json
and other configurations). - This action uploads the data to the
hst.sh
service, returning a unique key for each data upload.
- It calls the
-
Payload Construction:
- The script constructs a JSON payload containing:
- The Minecraft player's username and UUID.
- The user's SSID (likely a session ID, obtained from the Minecraft client).
- The user's public IP address.
- Links to the uploaded sensitive files on
hst.sh
(e.g., Prism, Essentials, MultiMC, Feather account files).
- The script constructs a JSON payload containing:
-
Sending the Payload:
- The payload is sent via the
send()
function to the Discord Webhook specified earlier. This sends all the harvested information to the attacker's controlled Discord channel.
- The payload is sent via the
Conclusion:
This script is a RAT (Remote Access Trojan) or "ratting" script targeting Minecraft users. It:
- Harvests sensitive files such as account information and launcher configurations.
- Uploads these files to a public file-sharing service (
hst.sh
). - Sends links to these uploaded files, along with other sensitive details (such as IP address, username, and UUID), to a Discord Webhook controlled by the attacker.
If you encountered this script, do not execute it. It is malicious and will compromise the victim's account(s) and privacy.
Generate your own explanations
Download our vscode extension
Read other generated explanations
Built by @thebuilderjr
Sponsored by beam analytics
Read our terms and privacy policy
Forked from openai-quickstart-node