Micro Stealer Campaign

Forensic Analysis of a Discord Credential Theft Operation
December 5, 2025 – January 3, 2026

TL;DR

Micro Stealer is a Java-based infostealer distributed as fake game downloads. It extracts:

Key findings: Anti-recovery tactics block Discord support & Google account recovery. Victims are extorted via WhatsApp and threatened with weaponized false reports if they refuse to pay.

Are You Affected?

You may be a victim if you:

Immediate Actions for Victims

1. Discord Account
2. Google/Gmail Account
3. All Passwords
4. System Cleanup
# Remove malware artifacts (PowerShell as Admin)
Remove-Item -Recurse -Force "$env:APPDATA\erkan"
Remove-Item -Force "$env:APPDATA\ysnd.jar"

# Check for persistence
Get-ScheduledTask | Where-Object {$_.TaskPath -like "*erkan*"}
Get-ItemProperty HKCU:\Software\Microsoft\Windows\CurrentVersion\Run

How the Operation Works

Step 1: Social Engineering

Attackers pose as indie game developers on Discord, sending DMs about "beta testing" a platformer game. The malware is disguised as game installers with names like EldrynWorld.exe, Crushfall.exe, Furfall.exe, or ChurryFall.exe.

A professional-looking fake website (eldrynworld.com) adds legitimacy:

Screenshot of eldrynworld.com fake game website used to distribute malware

The fake eldrynworld.com website featuring a fictional fox platformer game. The "Download Beta" button delivers the malware.

Step 2: Data Exfiltration

Once executed, Micro Stealer harvests everything and uploads it to gofile.io:

A summary of the stolen data is automatically posted to the attackers' Discord server via webhook, alerting them to a new victim.

Step 3: Extortion

Attackers contact victims via WhatsApp from Turkish phone numbers (+90), demanding payment (often in cryptocurrency) in exchange for "leaving them alone" and not exploiting their stolen data further.

WhatsApp ransom conversation from Turkish number +90 542 732 05 64

Opening line: "Do you want your belongings back?"

Phone: +90 542 732 05 64 (Turkey)

The victim (Russian-speaking) responded: "What else did you manage to steal?" and "I won't speak English anymore. We'll have to shut down your little operation."

Do not pay. There is no guarantee attackers will return access, and payment funds further criminal activity.

Step 4: Account Takeover & Weaponized False Reports

Regardless of whether the victim pays, attackers systematically lock them out of all accounts:

WEAPONIZED FALSE REPORTS: When victims refuse to pay, attackers manufacture evidence of ToS violations (including CSAM solicitation) using the victim's compromised account, then report the victim to Discord. This results in account bans that are extremely difficult to appeal.

→ Read the full case study — a detailed forensic analysis of how this weaponized false report attack destroyed an innocent victim's 11-year-old Discord account.

Step 5: Nitro Exploitation

If the victim had Discord Nitro, their compromised account is pulled into a secondary Discord server ("confianza es 909") where they're tagged with humiliating roles:

Discord screenshot showing victim tagged with 'rich bitch' role

The attackers then exploit the victim's Nitro benefits — server boosts, animated emojis, higher upload limits — before eventually selling or abandoning the account.

Malware Technical Details

The ~164MB executable is an NSIS installer that drops a Java-based stealer into %APPDATA%\erkan\. It bundles its own JRE to avoid dependencies and uses Zelix KlassMaster obfuscation ($500+ commercial tool) to evade detection.

A license key (license-20251031231401-cba2) found in the payload indicates this is purchased malware-as-a-service — the attackers are customers of a stealer kit, not the original developers.

Discord Client Injection & Reinfection

Beyond stealing data, the malware injects persistent code into the Discord client at %APPDATA%\discord\. This injection survives Discord restarts and re-exfiltrates data every time the victim opens Discord.

Case Study: Victim Reinfected 6 Times in 4 Hours

One victim was compromised 6 separate times on the same day because they didn't know their Discord client was infected:

TimeEvent
18:26Initial infection
20:27Reopened Discord → reinfection (+2 hours)
21:29Reopened Discord → reinfection (+1 hour)
21:43Reopened Discord → reinfection (+14 min)
22:24Reopened Discord → reinfection (+41 min)
22:43Reopened Discord → reinfection (+19 min)

The victim likely noticed something was wrong and restarted Discord or their computer, but this doesn't remove the injection. Each restart just triggered another exfiltration.

To fully remove the infection:
  1. Completely uninstall Discord (not just close it)
  2. Delete the entire folder: %APPDATA%\discord\
  3. Delete the malware folder: %APPDATA%\erkan\
  4. Reinstall Discord fresh from discord.com

Simply changing your password or enabling 2FA won't help if the Discord client itself is compromised — the injected code will steal your new credentials and session tokens immediately.

Technical Indicators (IOCs)

File Hashes (SHA256)

installer.exe   ef38f3c3a3ba1114ed2336f2ab7c6f0a59f0f345fcf19385997f0edecca7c243
ysnd.jar        afff725e321c7ef7d159b1895e2d131ea4161bfd74e306f6b776cbda6ecdc99f
swazla.exe      f61fd2cf06604458a65f254642b531e985c2ca174999951f0a7830a356fae39f

Filesystem Artifacts

%APPDATA%\erkan\                    # Installation directory
%APPDATA%\erkan\jre\bin\swazla.exe  # Malicious Java launcher
%APPDATA%\ysnd.jar                  # Stealer payload

Malware Filenames

EldrynWorld.exe Crushfall.exe Furfall.exe ChurryFall.exe

Recommendations

For Individuals

For Game Developers

Attackers impersonate indie game developers to distribute malware. Protect your reputation and help players identify legitimate builds:

Warning about itch.io: As of January 2026, itch.io does not scan uploaded executables for malware. The "ChurryFall" stealer in this campaign is actively being distributed through itch.io. Until itch.io implements malware scanning, treat all executable downloads from itch.io with the same caution as random Discord links. We urge itch.io to implement basic malware scanning to protect their community.

If someone claims to be a game developer and asks you to download an .exe directly, ask them to publish it on Steam instead. Legitimate developers will understand.

For Platform Security Teams

Report To

Entity Contact Report
Vercel vercel.com/abuse eldrynworld.com hosting
GoDaddy [email protected] Domain registration
itch.io itch.io/support ChurryFall malware distribution
Discord Trust & Safety In-app reporting Attacker accounts/servers
WhatsApp/Meta In-app reporting Turkish numbers used for ransom