The malware searches specific local directories (e.g., %AppData%\Discord\Local Storage\leveldb ) where Discord stores session tokens.
The stolen data is typically sent back to the attacker via a Discord Webhook , which allows the malware to post the data directly into a private Discord server controlled by the attacker. 3. Deployment Context
Beyond Discord, it may scrape: Web browser passwords and cookies. IP addresses and system hardware IDs. Payment information saved in browsers.