
TL;DR Don't run random "games" sent over Discord, even from friends. Even if they're hosted somewhere that looks legitimate. Google it. Upload it to VirusTotal first. The campaign we are going to look at today steals credentials, crypto wallets, and browser sessions, then spreads through the compromised accounts it just emptied. We are going to look at Myth Journey or https://myth-journey.com
If you already ran it skip to the bottom, to "If You Ran It" immediately.
A friend messages you on Discord.
They want you to test their game.
You run it. Nothing happens.
48 hours later, your accounts are gone.
This is already happening. The Myth Journey campaign is active as of April 2026, and it costs the attacker nearly nothing to operate. I learned about it because my personal friend was compromised and asked me to "test his new game". Talk about sending your malware to the wrong person.
Why This Attack Is So Cheap to Run
This malware doesn't need its own infrastructure anymore. It borrows legitimacy.
The Myth Journey landing page at myth-journey.com runs on Vercel's free tier, the same platform used by thousands of legitimate developers. The payload is hosted on GitHub Releases, with gofile.io as a fallback. The installer is 86 MB, indistinguishable in size from a real game download. Every piece of this sits on infrastructure the attacker didn't build and doesn't pay for.
The underlying malware, Myth Stealer, is sold as a subscription service on Telegram, payable in crypto and Razer Gold. A buyer doesn't write code. They pay a fee, get access to a builder, and assemble their own delivery chain. The Myth Journey campaign is one operator's version. There are others running parallel variants under different names with the same payload kit.
The result is a fully functional, professional-looking attack with near-zero overhead. A GitHub link or a Vercel URL is not a trust signal. The HTTPS padlock, the polished page, the fast download speed, none of these mean anything.
Why People Fall For This (And Still Will)
The attack spreads through social engineering on common chat platforms.
Everyone wants to play new games with their friends. Especially games their friends wrote. But your friend didn't send you that. Their hijacked account did.
Discord tokens, the session credentials that keep you logged in, are a primary target for this entire malware category. Once stolen, a token gives an attacker full account access without the password, without triggering 2FA. They can read your message history, understand your relationships, and craft targeted messages that fit the conversation. The account looks and sounds like your friend because it has your friend's entire history to draw from.
The lure is a game because it's plausible. Indie development is common. Beta testing is expected. The ask is small. There's no obvious red flag in the request itself, which is the point.
The download page adds one more nudge. The instructions read: "do not extract the ZIP file and run it in the zip for the best experience." That's not advice, it's an anti-inspection technique. The instruction discourages the one thing that might reveal what's inside before you execute it.
If anyone on Discord asks you to run a game or an installer, verify through a second channel before you do anything. Call them. Ask what the game is about. A stolen account cannot answer that question in real time.
What Happens After You Click Run
Here is the full execution sequence, based on direct binary analysis and sandbox observation of our exact sample.
Stage 1: The Installer
"MythicJourney Setup 1.1.2.exe" is an 86MB NSIS self-extracting installer, the same format used by Notepad++ and VLC. It shows a progress bar. It looks like every other installer you've ever run.
SHA-256: 1567e11339c9dd227691111007a2021a90195f28a1d4b7766c1baee961953324
The PE header checksum is zeroed. The compile timestamp reads 2018, a seven-year-old NSIS stub, reused because the timestamp mismatch confuses automated triage. The 86 MB of malicious content doesn't live in the standard PE sections at all, it's compressed in the overlay, invisible to plain string scanning. This malware hides its real payload so well that basic antivirus tools don't even see it. AV detection at time of analysis was effectively zero.
Inside the compressed overlay:
app-64.7z - an 85 MB archive containing a complete Electron application (the actual stealer)
- Five other NSIS plugin DLLs for extraction and execution
- A fake uninstaller for cover
The install sequence:
- NSIS decompresses everything to "
%TEMP%\nsd557A.tmp\" - Installs the Electron payload to "
%LOCALAPPDATA%\Programs\MythicJourney\MythicJourney.exe" - Drops a persistence copy to "
%LOCALAPPDATA%\mythicjourney-updater\installer.exe" - Then deletes the temp directory.
By the time installation finishes, there's no trace of how it got there, and the malware is running under a name that looks like a normal app.
Stage 2: The Electron Payload
MythicJourney.exe is a full Electron application, the same framework used by VS Code, Slack, and Discord itself. Packaging a stealer as an Electron app is deliberate. It looks like legitimate software, behaves like legitimate software, is interpreted at runtime, and its network traffic looks like legitimate software.
The bundled native addons tell you exactly what it's after:
ModuleWhat it does
@primno/dpapiCalls Windows "
CryptUnprotectData" to decrypts browser master keys
better-sqlite3Reads browser SQLite databases directly (
Login Data,
Cookies,
Web Data)
robotjsScreen capture, keyboard input
archiverZIP packages stolen data for exfiltration
aes-jsEncrypts staged data locally
Stage 3: Three Layers of Obfuscation
The stealer logic lives in a single 2.9 MB JavaScript file (main.js) inside the Electron application archive. It is layered three levels deep.
The outer layer uses a custom base91 encoding scheme: 321 string table entries, shuffled by a rotation function, the entire script wrapped in an obfuscated Function() constructor so nothing executes or resolves until runtime. No plaintext URLs. No IPs. Nothing for a scanner to catch.
Decoding that reveals an AES-256-GCM encrypted second payload embedded directly in the file:
Key: 26303b532115653c49f950999fa94f1af5abb94a8f39b113e102025adbc6ba4b
Nonce: 74fa957219626ffb885f5aec
Decrypting yields 1.1 MB of a second obfuscated JavaScript payload, itself with 679 encoded string table entries and state-machine control flow. The only thing that leaked in plaintext was the module list passed to require() — "axios" (HTTP client for C2), "crypto", and "bytenode" (bytecode loader, likely a third stage we haven't reached). The C2 address is still locked inside those 679 encrypted strings.
NSIS installer (86 MB)
└─ app-64.7z (Electron runtime)
└─ app.asar → main.js (basE91 obfuscated)
└─ AES-256-GCM decrypt → stage2.js
└─ [bytenode .jsc] → possible Stage 3
The malware is a set of nested encrypted containers. You have to crack each layer before you can even see the next one. I got through two layers. There may be more beyond the third I haven't decoded.
Stage 4: Reconnaissance and Evasion
I also uploaded a sample to VirusTotal for their sandboxes and HybridAnalysis. HybridAnalysis was good at teasing out the various layers of anti-reversing at play. Before touching credentials, the payload verifies the environment. It spawns 17+ PowerShell instances and queries system hardware, disk drives, BIOS, motherboard, RAM, GPU, monitors, then runs explicit evasion checks:
"(Get-CimInstance Win32_ComputerSystem).HypervisorPresent" — are we in a VM?
"[System.Windows.Forms.SystemInformation]::TerminalServerSession" — are we in an RDP/sandbox session?
"echo %COMPUTERNAME%.%USERDNSDOMAIN%" — are we on a corporate domain-joined machine?
"WHERE smartctl" — are disk forensics tools installed?
It immediately kills watcher.exe and mitmdump.exe, common dynamic analysis and MITM proxy tools, by name. If something is watching it, it kills the watcher.
The sandbox we submitted this to scored it 100/100 malicious. But AV marked it clean at runtime! That gap is the entire point of this evasion layer.
Stage 5: Credential Theft and Exfiltration
With the environment cleared, the payload:
- Opens a handle to "
lsass.exe", the Windows process holding cached authentication credentials in memory (NTLM hashes, Kerberos tickets)
- Injects 4,024 bytes into 18 PowerShell processes, with
PAGE_GUARD memory protection on the injected code to block memory dumping
- Reads "
desktop.ini" from every user shell folder (Desktop, Documents, Downloads, Music, Pictures, Videos, OneDrive), mapping the filesystem for data staging
- Attempts to access "
%APPDATA%\EXODUS\EXODUS.WALLET\SEED.SECO", the Exodus wallet master seed phrase
- Decrypts browser credential stores via DPAPI and reads browser SQLite databases directly
- Packages everything into an encrypted archive for exfiltration
It's suspected that the C2 communication goes out over TLS:443 to CDN-fronted endpoints (104.16.124.96 on Cloudflare and 142.251.210.35 on Google's network). These are not the attacker's servers, they're CDN edge nodes. This enables the C2 to automatically rotate IPs without touching the malware binary and the network traffic is indistinguishable from normal HTTPS to Google.
The runtime also installs a certificate into the Windows certificate store, allowing its own TLS to be trusted without triggering OS warnings.
By the time this finishes, your browser passwords, session cookies, Discord token, and wallet seed are on a remote server. Your Discord account is now delivering the same message to your contacts.
If You Ran It
Assume full compromise. Don't spend time figuring out what was taken, move immediately.
- Change every password from a clean device.
- Revoke all active sessions: Discord, Google, GitHub, any financial service.
- Enable hardware 2FA: TOTP app or phone verification minimum
- Regenerate cryptocurrency wallets from a clean seed on a clean machine, then move funds before anything else.
- Delete "
%LOCALAPPDATA%\Programs\MythicJourney\" and "%LOCALAPPDATA%\mythicjourney-updater\"
- Check "
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup" for unexpected shortcuts
- Report "
github.com/ryprs" and "myth-journey.com" to GitHub and Vercel abuse teams
The attacker who built this campaign is almost certainly a MaaS customer, not the malware author. The author sells the kit; operators build their own delivery chains. The same payload runs under different names in parallel campaigns. If a friend on Discord asked you to test a game and something feels off, their account may already be hacked.
Analysis date: April 2026 · Classification: Infostealer / MaaS / Social Engineering · Threat level: Med