(5).exe | Botlucky-client
Scour the system for digital wallet keys or browser extensions.
The file is part of a malicious campaign linked to a threat actor known as Water Curse . This actor targets developers, gamers, and penetration testers by disguising malware as useful open-source tools or game bots on platforms like GitHub . botlucky-client (5).exe
It may use trusted Microsoft applications like msbuild.exe to compile and execute malicious code directly in memory, making it harder for antivirus software to detect. Scour the system for digital wallet keys or
The initial .exe often acts as a "loader" that fetches additional scripts (PowerShell, JavaScript, or C#) from remote servers. It may use trusted Microsoft applications like msbuild
Water Curse is a actor. If botlucky-client.exe is executed, it may attempt to:
Harvest passwords and session tokens from web browsers.
If you have downloaded or attempted to run this file, experts from Securonix and Trend Micro suggest the following: