ANY.RUN malware analysis researchers have published analysis of MicroStealer, a credential-stealing infostealer that has been active since December 2025 and has shown sustained targeting of education and telecommunications sector organisations. The malwareโs exclusive use of Discord webhooks for data exfiltration โ a pattern increasingly common among commodity infostealers following the broader industry trend documented earlier this week โ results in low detection rates by network-based security controls and traditional antivirus engines.
Delivery and Execution Chain
MicroStealerโs delivery uses a multi-stage chain designed to bypass static analysis:
Stage 1 โ Lure document: Phishing emails carry password-protected archive attachments (ZIP or RAR) containing a malicious LNK (Windows shortcut) file. The password is included in the email body โ a technique that prevents email gateway attachment scanning from inspecting the archive contents.
Stage 2 โ LNK execution: The LNK file executes a PowerShell command that downloads a obfuscated dropper script from a legitimate file hosting service (GitHub, GitLab, or OneDrive โ varying by campaign). Using legitimate hosting services for stage-2 download prevents URL reputation filtering from blocking the download.
Stage 3 โ MicroStealer payload: The dropper deploys the MicroStealer executable and establishes persistence via a Windows Registry run key. The executable is a .NET binary packed with a commercial packer to reduce AV detection.
Data Collection Capabilities
MicroStealer harvests:
- Browser credentials: Chromium-based browser credential databases (Chrome, Edge, Brave, Opera), Firefox credential stores
- Session tokens: Cookies from all browsers, including authentication session cookies for common enterprise SaaS (Microsoft 365, Salesforce, Google Workspace)
- Cryptocurrency wallets: Extension storage for MetaMask, Phantom, Coinbase Wallet; standalone wallet application files
- Screenshots: Multiple sequential desktop screenshots at collection time, providing the attacker a visual overview of the victimโs active work
- System information: OS version, hostname, installed security software, domain membership
- Clipboard content: Contents of the clipboard at collection time
All collected data is compressed and transmitted via a Discord webhook URL embedded in the executable. Discord webhooks accept POST requests to the discord.com API โ a domain and service that is universally permitted in enterprise network environments.
Education and Telecom Sector Targeting
The sector concentration is notable. Education institutions are attractive targets for infostealers for several reasons: they typically have larger-than-average user populations, diverse software environments that make policy enforcement difficult, and valuable data including research datasets, financial aid records, and in some cases payment card data from student services. Credentials from education accounts (university email, learning management systems) are also valued for follow-on social engineering attacks.
Telecommunications operators hold sensitive data including subscriber records, call detail records, network infrastructure credentials, and in some jurisdictions, lawful intercept infrastructure access. Credential theft from telecom employees with system administration access provides the entry point for more serious intrusions.
Detection
ANY.RUNโs analysis provides YARA rules and network signatures for MicroStealer detection. Key behavioural indicators:
- LNK file spawning PowerShell with base64-encoded commands and outbound connections to GitHub/GitLab during initial execution
- .NET process making HTTPS POST requests to
discord.com/api/webhooks/with multipart form data (exfiltration pattern) - New registry run key pointing to
%APPDATA%directory created by a PowerShell parent process
For organisations in education and telecommunications: review email security gateway configuration for password-protected archive handling โ consider requiring password-protected attachments to be flagged for manual review rather than allowing automatic delivery. Monitor for Discord API webhook traffic originating from non-browser processes via EDR process-level network attribution.
Share this article