Skip to main content

Botlucky-client (5).exe Apr 2026

Harvest passwords and session tokens from web browsers.

It may use trusted Microsoft applications like msbuild.exe to compile and execute malicious code directly in memory, making it harder for antivirus software to detect. botlucky-client (5).exe

The file is part of a malicious campaign linked to a threat actor known as Water Curse . This actor targets developers, gamers, and penetration testers by disguising malware as useful open-source tools or game bots on platforms like GitHub . Harvest passwords and session tokens from web browsers

The initial .exe often acts as a "loader" that fetches additional scripts (PowerShell, JavaScript, or C#) from remote servers. botlucky-client (5).exe

The malware employs several stealthy tactics to bypass traditional security measures: