Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

MicroStealer

150
Global rank
65 infographic chevron month
Month rank
55 infographic chevron week
Week rank
0
IOCs

MicroStealer is a rapidly emerging infostealer first prominently observed in late 2025. It specializes in stealing browser credentials, active session data, screenshots, cryptocurrency wallets, and system information. It spreads quickly with low detection rates thanks to a sophisticated multi-stage delivery chain and exfiltrates data via Discord webhooks and attacker-controlled servers.

Stealer
Type
Unknown
Origin
1 December, 2025
First seen
5 May, 2026
Last seen

How to analyze MicroStealer with ANY.RUN

Type
Unknown
Origin
1 December, 2025
First seen
5 May, 2026
Last seen

IOCs

IP addresses
213.142.135.175
213.142.135.203
45.145.42.77
Domains
rocobe.pages.dev
miavna.pages.dev
zarvethion.com
velarith.com
feridogames.com
leynara.com
velarith.pages.dev
seylaran.com
crushfall.com
elvarioth.com
klozerus.com
nightsthread.com
rocobe-beta.pages.dev
eclipsewarden.com
vontabeta.pages.dev
athena.bingo
hoyavor.com
epicdepths.com
shadowcape.com
arcaneharbor.com
Last Seen at

Recent blog posts

post image
Release Notes: Expanded Threat Intelligence A...
watchers 5119
comments 0
post image
Margin vs. Madness: Fixing MSSP Top 5 Operati...
watchers 2771
comments 0
post image
Phishing-to-RMM Attacks: The Remote Access Bl...
watchers 7786
comments 0

MicroStealer Explained: A Lightweight Malware with Heavy Business Impact

Key Takeaways

  1. MicroStealer uses a layered NSIS → Electron → Java chain for evasion and rapid spread.
  2. It steals more than passwords, focusing on browser sessions, cookies, screenshots, and wallets for immediate impact.
  3. Education and telecom sectors show heightened exposure; gaming lures expand reach.
  4. Low AV detection + redundant exfiltration (Discord + C2) enable quick, reliable data theft.
  5. Session hijacking turns endpoint compromise into persistent enterprise access.
  6. Behavior-based sandbox analysis is essential for early detection of emerging stealers.
  7. Proactively defend with ANY.RUN's Threat Intelligence Lookup for instant IOC/variant hunting and Threat Intelligence Feeds for real-time campaign visibility and automated protection — empowering SOCs to stop MicroStealer before it strikes.

threatName:"microstealer".

Malware overview in TI Lookup Malware overview in TI Lookup: landscape, IOCs, and more

What is MicroStealer Malware?

MicroStealer is an emerging infostealer malware that quietly targets browser credentials, session cookies, desktop screenshots, and cryptocurrency wallet files; all while evading traditional signature-based detection. First observed in December 2025, it gained rapid traction in sandbox environments within weeks of appearing in the wild, yet many security vendors still failed to flag it.

Its deceptively sophisticated architecture — wrapping a Java-based payload inside an Electron application inside an NSIS installer — makes it harder to analyze statically and gives it an edge during the critical early window of a campaign.

MicroStealer is not just another entry in a crowded field: it represents a new wave of professionally engineered infostealers designed to infiltrate corporate environments and exfiltrate identity data before defenders even know to look.

ANY.RUN’s Interactive Sandbox detects MicroStealer and lets observe the attack chain in its secure environment.

View sandbox analysis

MicroStealer analysis in Interactive Sandbox MicroStealer detonated in Interactive Sandbox

The malware's Node.js component is heavily obfuscated using LZ-String UTF-16 compression, compressed string arrays with numeric indices, flattened control flow, and dead code padding. Before executing its main payload, MicroStealer checks the runtime environment for processes and services commonly associated with virtual machines — if detected, execution terminates immediately, a classic anti-analysis technique.

Once running, the stealer collects:

  • Browser credentials, cookies, and session tokens from Chromium and other popular browsers;
  • Desktop screenshots;
  • Cryptocurrency wallet files;
  • Discord and Steam account profile data (used for reconnaissance and target prioritization).

All collected data is archived and exfiltrated through two simultaneous channels: Discord webhooks and attacker-controlled exfiltration servers. Using dual channels is a resilience strategy: if one endpoint is taken down, the other ensures the stolen data still reaches the threat actor.

The malware's own User-Agent header during its initial connection to Discord reads: MicroStealer/1.0 — an unusually transparent self-identification that serves as a reliable network-level detection signature for defenders who know to look.

For detailed static analysis of MicroStealer sample performed by ANY.RUN's team, explore the article in the corporate blog.

How MicroStealer Threatens Businesses and Organizations

MicroStealer poses significant risks beyond individual data theft:

  • Credential and Session Compromise: Steals browser-stored logins and active sessions for SaaS platforms, VPNs, cloud services, and corporate portals, enabling lateral movement and privilege escalation.

  • Persistent Stealth Access: Session hijacking blends malicious activity with legitimate traffic, prolonging undetected presence.

  • Business Email Compromise (BEC): Attackers gain control of corporate email, enabling fraud, invoice manipulation, and executive impersonation.

  • Data Exfiltration and Reckon: Quickly sends screenshots, profiles (e.g., Discord, Steam), and sensitive files, supporting targeted follow-on attacks or sale on underground markets.

  • Ransomware Gateway: Stolen initial access often feeds broader intrusions, BEC, or supply-chain attacks.

  • Compliance and Reputational Damage: Exposure of corporate identities risks regulatory violations and loss of trust.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Victimology: Who Is Most at Risk?

Analysis of MicroStealer submissions to the ANY.RUN sandbox shows that about 50% of observed sample uploads originated from the United States and Germany, indicating focused activity in these two major economies. The education and telecommunications sectors have shown the most elevated exposure among confirmed cases.

Industry risk profiles based on observed targeting and structural vulnerabilities Industry risk profiles based on observed targeting and structural vulnerabilities

Evolution of MicroStealer & Notable Activity

MicroStealer reflects a broader trend: infostealers evolving from simple credential grabbers into access brokers’ tools.

Key evolutionary traits:

  • Shift from file-based payloads to loader-based delivery;
  • Increased use of encryption and obfuscation;
  • Integration with underground marketplaces for data resale;
  • Faster exfiltration cycles to reduce detection windows.

While MicroStealer itself may appear under different names or variants, its behavior aligns with modern MaaS (Malware-as-a-Service) ecosystems.

How Does MicroStealer Get In the System and Spread?

Common vectors:

  • Compromised or Impersonated Accounts: Social engineering via trusted-looking messages or posts.

  • Malicious Downloads: Fake "Game Launcher" or software installers from attacker-controlled or compromised sites (e.g., Dropbox-hosted payloads, Discord CDN).

  • Phishing/Malvertising: Lures promising games, tools, or updates.

  • Drive-by or Trojanized Software: Especially in gaming/piracy ecosystems.

Once the victim runs the downloaded installer (RocobeSetup.exe), the NSIS installer silently deploys the Electron application and a UAC prompt is presented under the guise of a normal "Game Launcher" installation process — a social engineering layer built directly into the technical chain. MicroStealer does not use vulnerability exploitation for initial access; it relies entirely on the user making a trust-based decision to run the file.

How MicroStealer Malware Functions

MicroStealer's full execution chain can be broken into four distinct stages:

Stage 1: NSIS Installer (RocobeSetup.exe). The outer wrapper is a standard NSIS archive installer. It contains the Electron application, ASAR archives (app.asar and app.asar.unpacked), and the main payload — a JAR file accompanied by a bundled Java Runtime Environment — packaged inside module.zip.

Stage 2: Electron Application (Game Launcher.exe). The Electron app requests administrator privileges through a UAC dialog. Once elevated, it unpacks the bundled JRE and JAR file, placing them in %LOCALAPPDATA%. The Java executable is renamed miicrosoft[.]exe (a typosquat on the legitimate Microsoft name) to blend in with system processes during casual inspection.

Stage 3: Node.js Launcher (index.js inside app.asar). A heavily obfuscated Node.js script handles the extraction and launch of the JAR payload. Strings within the script are compressed using the LZ-String library's UTF-16 encoding and stored in a single Unicode variable, then split by a pipe delimiter and retrieved by numeric index. After extracting and deobfuscating this logic, the script resolves to a straightforward spawn() call that launches miicrosoft.exe -jar soft.jar in a detached, background process and then immediately terminates itself — ensuring the payload runs independently.

Stage 4: Java Payload (soft.jar). This is MicroStealer's core. The JAR file executes the actual credential-harvesting logic. Before beginning collection, it checks the execution environment against a list of processes and services associated with virtual machines; if a match is found, it exits. Otherwise, it:

  • Harvests credentials, cookies, and session tokens from browser profile directories;
  • Captures desktop screenshots;
  • Collects cryptocurrency wallet files;
  • Gathers Discord and Steam account data for reconnaissance;
  • Archives all collected data.

Exfiltrates the archive to both a Discord webhook endpoint and a freshly registered attacker-controlled server, using the User-Agent string MicroStealer/1.0

The dual-destination exfiltration design ensures redundancy: if either the Discord webhook or the custom server becomes unavailable or is taken down, the other still delivers the stolen data. The use of newly registered domains for the secondary exfiltration endpoint also means these domains carry no historical threat reputation at the time of the attack, further evading domain-reputation-based network defenses.

How Businesses Can Proactively Protect Against MicroStealer

The core challenge MicroStealer poses is detection lag: it spreads and exfiltrates data while antivirus signatures haven't caught up yet. This is where proactive threat intelligence — specifically ANY.RUN's TI Feeds and TI Lookup — provides a decisive defensive advantage.

ANY.RUN TI Lookup: Instant Contextual Investigation

Query TI Lookup for the threat name to instantly surface all related sandbox sessions, associated indicators, behavioral data, and attack chain details.

MicroStealer sandbox analyses found via TI Lookup MicroStealer sandbox analyses found via TI Lookup

TI Lookup allows pivoting from a single suspicious indicator to a full picture of the threat: which domains were contacted, what files were dropped, which MITRE ATT&CK techniques were used, and how similar samples have behaved across prior investigations. This transforms a vague alert into actionable, scoped threat intelligence within minutes.

domainName:"swordfull.info"

MicroStealer domain, IOCs, files, events MicroStealer domain, IOCs, files, events

TI Lookup also supports industry and geographic threat landscape filtering, allowing security teams to assess whether a threat like MicroStealer is actively targeting their specific sector or region before committing investigation resources, enabling smarter alert prioritization.

ANY.RUN TI Feeds: Continuous IOC Delivery to Your Security Stack

Threat Intelligence Feeds provide a continuously updated stream of indicators of compromise (malicious IPs, domains, URLs) derived from real sandbox analysis sessions run by over 600,000 security researchers and analysts across more than 15,000 organizations. IOCs are delivered in STIX/TAXII format for direct integration with SIEM platforms, EDR systems, IDS/IPS, and threat intelligence platforms such as OpenCTI, ThreatConnect, and ThreatQ.

TI Feeds integration options TI Feeds integration options

Because MicroStealer relies heavily on fresh infrastructure (newly registered domains with no historical reputation), real-time feed delivery is specifically valuable against this threat. Every IOC in TI Feeds is accompanied by a full sandbox report: process trees, network traffic maps, MITRE ATT&CK technique mappings, and behavioral evidence — giving SOC analysts the context they need to act rather than just a raw indicator to block.

Additional Measures:

  • Robust endpoint detection with behavior-based analysis (sandboxing).

  • Browser security (e.g., session isolation, no saved credentials where possible).

  • MFA with hardware keys or phishing-resistant methods.

  • Least privilege, network segmentation, and regular credential rotation.

  • Email/web filtering and application allowlisting.

  • Monitor for anomalous Discord/webhook traffic or unusual Java/Electron processes.

  • Awareness training on social engineering and suspicious downloads.

MicroStealer Sandbox Analysis: Confirm Behavior Instead of Guessing

New malware families like MicroStealer often lack clear static signatures or reliable reputation data, which slows down traditional investigation workflows.

Instead of relying only on static verdicts, analysts can quickly confirm what a suspicious file actually does by executing it in a controlled environment.

Running the sample in the ANY.RUN interactive sandbox reveals the full execution chain, including:

  • NSIS installer delivering the payload;
  • Electron loader extracting the JAR module;
  • Java stealer executing its data collection logic;
  • Attempts to steal browser credentials and wallet data;
  • Communication with Discord webhooks and external servers.

View sandbox analysis

MicroStealer analysis in Interactive Sandbox MicroStealer detonated in Interactive Sandbox

Within minutes, analysts can observe the complete attack chain, extract reliable IOCs, and determine whether the sample poses a real threat.

MicroStealer IOCs in Interactive Sandbox MicroStealer IOCs in Interactive Sandbox

For SOC teams, this replaces guesswork with behavior-based evidence, helping reduce investigation time and avoid unnecessary escalations.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

MicroStealer exemplifies the evolving infostealer threat: fast, evasive, and focused on high-value corporate identities. Its multi-stage design and session-stealing focus make traditional defenses insufficient. Organizations must combine proactive threat intelligence, behavioral detection, and human-centric security to stay ahead. Early visibility into such threats is key to preventing credential theft from escalating into major incidents.

Trial TI Lookup to start gathering actionable threat intelligence on the malware that threatens your business sector and region: just sign up to ANY.RUN.

HAVE A LOOK AT

Tykit screenshot
Tykit
tykit
Tykit is a sophisticated phishing-as-a-service (PhaaS) kit that emerged in May 2025, designed to steal Microsoft 365 corporate credentials through an innovative attack vector: malicious SVG files.
Read More
UpCrypter screenshot
UpCrypter
upcrypter
UpCrypter is a sophisticated malware loader that functions as a delivery mechanism for remote access tools. Distributed through global phishing campaigns targeting Windows systems, this actively maintained tool serves as the central framework for deploying various RATs including PureHVNC, DCRat, and Babylon RAT, enabling attackers to establish persistent remote control over compromised systems.
Read More
WhiteSnake screenshot
WhiteSnake
whitesnake
WhiteSnake is a stealer with advanced remote access capabilities. The attackers using this malicious software can control infected computers and carry out different malicious activities, including stealing sensitive files and data, recording audio, and logging keystrokes. WhiteSnake is sold on underground forums and often spreads through phishing emails.
Read More
BTMOB RAT screenshot
BTMOB RAT
btmob
BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks.
Read More
Balada Injector screenshot
Balada Injector is a long-running malware campaign that targets WordPress websites by exploiting vulnerabilities in plugins and themes. The attackers inject malicious code into compromised sites, leading to unauthorized redirects, data theft, and the creation of [backdoors](https://any.run/malware-trends/backdoor) for persistent access. The campaign operates in waves, with spikes in activity observed every few weeks, continually adapting to exploit newly discovered vulnerabilities.
Read More
Stealer screenshot
Stealer
stealer
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
Read More