Botlucky-client (5).exe Apr 2026
Harvest passwords and session tokens from web browsers.
It may use trusted Microsoft applications like msbuild.exe to compile and execute malicious code directly in memory, making it harder for antivirus software to detect. botlucky-client (5).exe
The file is part of a malicious campaign linked to a threat actor known as Water Curse . This actor targets developers, gamers, and penetration testers by disguising malware as useful open-source tools or game bots on platforms like GitHub . Harvest passwords and session tokens from web browsers
The initial .exe often acts as a "loader" that fetches additional scripts (PowerShell, JavaScript, or C#) from remote servers. botlucky-client (5).exe
The malware employs several stealthy tactics to bypass traditional security measures: