top of page

DeerStealer Malware Uses .LNK Files to Evade Detection and Steal Data

July 23rd, 2025

High

Our Cyber Threat Intelligence Unit has identified an active campaign distributing DeerStealer malware through malicious Windows shortcut files (.LNK). These shortcuts mimic legitimate documents (e.g., “Report.lnk”) but execute Windows native binaries, such as mshta.exe, cmd.exe, and PowerShell to deliver and run the payload. DeerStealer is designed to gather sensitive data and send it to attacker-controlled servers. This living-off-the-land (LOL‑Bin) approach bypasses traditional file filters and leverages trusted OS components, increasing its stealth by exploiting user trust.

Technical Details

  • Malware Family: DeerStealer.

  • Severity: High.

  • Delivery Method: Weaponized .LNK files.

  • Technique: Obfuscated, multi-stage script execution (T1218.005 via mshta.exe).

  • Execution Chain: .lnk → mshta.exe → cmd.exe → PowerShell → Predator Payload.

Infection process:

  • Victim opens a seemingly benign .LNK (e.g., “Report.lnk”).

  • The shortcut launches mshta.exe, running obfuscated scripts with wildcard paths.

  • Scripts bypass logging/profiling, decode Base64/hex payloads, and execute them via PowerShell IEX.

  • A decoy PDF is displayed while DeerStealer silently installs in %AppData%.

  • DeerStealer exfiltrates data via HTTP POST to attacker servers.

Payload capabilities:

  • Browser/application credential theft.

  • Clipboard capture and system information harvesting.

  • Targeting cryptocurrency wallets and messaging apps.

  • Data exfiltration via HTTP.

Image by ThisisEngineering

Impact

The DeerStealer campaign presents several risks to organizations and individuals:

  • Credential theft, which allows unauthorized access.

  • Data loss, including personal and financial information.

  • Cryptocurrency compromise through wallet theft and clipper injection.

  • Identity theft, fraud, and the potential for follow-on phishing or lateral movement.

Detection Method

To detect and mitigate DeerStealer infections:

  • Monitor .LNK executions, particularly those received over email or messaging platforms.

  • Inspect PowerShell and script execution logs for suspicious activity initiated by shortcut files.

  • Capture PowerShell logs (if not disabled) and look for IEX/base64 decoding activity.

  • Monitor outbound HTTP POST requests to unfamiliar or suspicious domains.

  • Use EDR/AV to detect suspicious behavior with .LNK, mshta.exe, and script interpreter launches.

  • Implement YARA or Sigma rules targeting DeerStealer behavior and script signatures.

Indicators of Compromise


Type

Indicator

Domain

tripplefury[.]com

Hash

fd5a2f9eed065c5767d5323b8dd928ef8724ea2edeba3e4c83e211edf9ff0160 

Hash

8f49254064d534459b7ec60bf4e21f75284fbabfaea511268c478e15f1ed0db9 


mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Block .LNK execution from untrusted sources.

  • Enforce strict application control to restrict execution of unauthorized scripts.

  • Disable script execution policies for non-administrative users.

  • Use email and IM filters to detect and quarantine .LNK files.

  • Employ EDR signatures to identify DeerStealer script patterns.

  • Educate users about the risks of opening suspicious icons or shortcut files.

  • Regularly update endpoint protection with signatures for DeerStealer and similar threats.

Conclusion

The DeerStealer campaign highlights a growing trend where attackers leverage trusted Windows components and misleading file types to evade detection and distribute malware. By weaponizing .LNK files and exploiting native execution processes, attackers bypass traditional defenses while capitalizing on user familiarity with shortcut files.

To mitigate these risks, we recommend that organizations enhance visibility into shortcut file behavior, enforce strict script execution policies, and raise user awareness about social engineering tactics. Combining proactive monitoring, endpoint controls, and layered security strategies is crucial for detecting and stopping DeerStealer and other stealthy information-stealing threats.

bottom of page