Campaign Identifier: Houselet-PlayStation-Remote-Play-Masquerade
Last Updated: November 17, 2025
Go-based Stealer / Loader / RAT
Analyst: Joseph Harrison Date: November 2025 Environment: Windows 10 x64 (Userland / Kernel interaction observed) Classification: Go-based Stealer / Loader / Remote Access Trojan (RAT)
Table of Contents
- Quick Reference
- BLUF (Bottom Line Up Front)
- 1. Executive Summary
- 2. File & Build Characteristics
- 3. Portable Executable (PE) Structure
- 4. Static Analysis
- 5. Dynamic Analysis (Any.Run Sandbox)
- 6. Behavioral Summary
- 8. Threat Assessment
- 9. Incident Response Procedures
- 10. Mitigation & Detection Recommendations
- 11. Operational Impact Assessment
- 12. Long-term Defensive Strategy
- 13. Frequently Asked Questions
- 14. Conclusion
- IOCs
- Detections
Quick Reference
Detections & IOCs:
BLUF (Bottom Line Up Front)
Executive Summary
Business Impact Summary
Houselet.exe represents a sophisticated Go-based malware threat masquerading as legitimate PlayStation software. The malware establishes persistent access, exfiltrates sensitive data, and provides remote control capabilities. Containment and forensic investigation are recommended.
Key Risk Factors
| Risk Factor | Score | Business Impact |
|---|---|---|
| Data Exfiltration | 8/10 | High-value data theft including credentials, financial information, and sensitive business data |
| Persistence | 9/10 | Long-term unauthorized access with multiple persistence mechanisms |
| Remote Control | 8/10 | Full system control and capability to deploy additional malware |
| Detection Evasion | 7/10 | Advanced anti-analysis techniques complicate detection and removal |
Recommended Actions
- ISOLATE affected systems from network immediately
- IDENTIFY all potentially compromised endpoints (6.68MB PS Remote Play installers)
- COLLECT forensic evidence before remediation
- NOTIFY security team and legal/compliance departments
- ASSESS data exposure scope and regulatory notification requirements
Organizational Guidance
For Executive Leadership
- Resource Allocation: Assess incident response team deployment and system rebuild requirements
- Business Continuity: Evaluate potential disruption during remediation activities
- Compliance Obligations: Review regulatory reporting requirements if data breach confirmed
- Stakeholder Communication: Plan internal and external notification strategies
- Strategic Security: Consider long-term security investments for prevention
For Technical Teams
Recommended Actions:
- Deploy Detection Signatures: Check detections page for hunting rules and deploy across environment
- Hunt for IOCs: Search systems for indicators of compromise using provided hashes and patterns
- Network Analysis: Review logs for connections to malicious infrastructure
- System Isolation: Isolate any confirmed compromised systems from network
- Evidence Preservation: Collect forensic data before system remediation
- Threat Hunting: Conduct environment-wide hunt for additional compromised systems
For Detailed Technical Procedures:
- Malware capabilities: See Section 4 (Technical Capabilities Deep-Dive)
- Detection methods: See Section 5 (Evasion & Anti-Analysis Techniques)
- Incident response procedures: See Section 6 (Incident Response Procedures)
- Long-term defensive strategy: See Section 7 (Long-term Defensive Strategy)
1. Executive Summary
houselet.exe is a Go 1.15-compiled 64-bit Windows binary that masquerades as the PlayStation Remote Play installer. The sample is characterized by multiple layers of obfuscation, dynamic loading, and in-memory execution, aligning it with modular loader-stealer families such as STEALC or derivative Go-based frameworks. It primarily operates from the user’s temporary directory, communicates with a remote PHP-based C2 endpoint, and modifies registry/network configurations to maintain persistence and evade detection.
2. File & Build Characteristics
| Attribute | Value | Confidence Level |
|---|---|---|
| Malware Type | Go-based Stealer/Loader/RAT | CONFIRMED |
| File Type | PE32+ (x86-64) Windows Executable | CONFIRMED |
| Compiler / Runtime | Go 1.15 (static-linked) | CONFIRMED |
| Packaging Method | InstallShield-style stub (drops or runs child payloads) | LIKELY |
| Language | English | CONFIRMED |
| File Size | ~6.68 MB (6,683,840 bytes) | CONFIRMED |
| Entropy | 6.6 bits / byte (packed/compressed) | CONFIRMED |
| Digital Signature | Untrusted / self-signed | CONFIRMED |
| Impersonation Target | Sony Interactive Entertainment Inc. ("PS Remote Play Installer 8.5.0.08070_x64.exe") | CONFIRMED |
Hash Information
| Hash Type | Value |
|---|---|
| MD5 | 6f8351ff0adfd7b724bf34cab7c6052b |
| SHA1 | a803fa85b84e363604975a5682b279a69739a78e |
| SHA256 | 6fbaa2637e7c8773695dcf07a85dc830112da3d8dab5dbe277dfa96111470920 |
3. Portable Executable (PE) Structure
| Section | Purpose | Security Relevance |
|---|---|---|
| .text | Executable code (main logic) | HIGH - Contains malicious execution logic |
| .rdata | Go runtime metadata / strings | MEDIUM - May contain C2 URLs and encrypted data |
| .data | Global variables | MEDIUM - Configuration and state data |
| .pdata | Exception directory | LOW - Standard exception handling |
| .xdata | Unwind metadata | LOW - Exception unwind information |
| .idata | Import table | HIGH - Reveals API usage and capabilities |
| .reloc | Relocations | LOW - Standard relocations |
| .symtab | Symbol table with Go names | MEDIUM - Function names reveal capabilities |
| .rsrc | Installer resources / icons | HIGH - Contains fake PlayStation icons for deception |
4. Static Analysis
4.1 Capability Detection
- Network: UDP/TCP sockets, DNS queries
- System Access: Registry read/write, token manipulation, file ops
- Privilege Management: Escalates/impersonates tokens
- Anti-Analysis: Anti-VM checks, TLS allocation
- Installer Stub: May unpack/drop payloads
4.2 Cryptographic & Encoding Routines
- Base64 (326 matches)
- XOR (18 matches)
- AES (4 matches)
- RC4/Salsa20/ChaCha20 detected
- Hashing: FNV (20), Murmur3 (5)
4.3 Embedded Go Modules
Recovered paths: sunless/anesthetist/*.go, sunless/main.go
Functions: anesthetist.Nonprobableproagrarian, anesthetist.OverdevotedlyFrederick, etc. → in-memory decryption and RWX allocation.
4.4 In-Memory Execution Evidence
- Calls to VirtualAlloc, VirtualProtect
- Nested goroutines for payload staging
- Thread-safe memory ops via sync.Mutex, sync.Once
- Synthetic structs in .rdata as decoys
4.5 System & OS-Level Functions
- os.Executable, os.getModuleFileName
- syscall.NewLazyDLL, LazyProc.Call
- Reflective DLL loading and privilege manipulation
4.6 Go Runtime Behavior
- Threads & Goroutines: runtime.mstart, runtime.main
- Synchronization: sync/once, sync/mutex
- String processing: unicode/utf8, encoding/binary
5. Dynamic Analysis (Any.Run Sandbox)
5.1 Execution Chain
- Parent: explorer.exe
- Child: houselet.exe (self-spawned)
- Path: %TEMP%\houselet.exe
- Detection Label: STEALC variant
5.2 Registry & Config Mods
- Alters IE settings (cache, proxy bypass)
- Adds ZoneMap entry under HKCU
5.3 Network Communication
- HTTP POST → http://45.155.69[.]25/b8380e89dabaee4a.php
- Destination: 45.155.69[.]25:80
- Purpose: Exfiltration / C2
5.4 System Reconnaissance
- Queries computer name, locale, IE settings
5.5 Memory & Thread Activity
- Multiple goroutines for concurrent tasks
- RWX memory allocations
- Hidden threads via sync.Once
5.6 Observed Artifacts
- Executable: %TEMP%\houselet.exe
- Network IP: 45.155.69[.]25
- C2 Endpoint: /b8380e89dabaee4a.php
- Certificate: Untrusted/self-signed
6. Behavioral Summary
- Execution: Runs from Temp, self-spawns, registry persistence
- Memory Loading: Decrypts payloads into RWX pages
- Network: HTTP POST to C2, exfiltrates data
- Registry Mods: Alters IE ZoneMap/proxy keys
- Privilege Ops: Token manipulation
- Evasion: Anti-VM, fake Sony metadata
- Crypto: Base64, AES, RC4, ChaCha
- Concurrency: Nested goroutines
8. Threat Assessment
| Assessment Category | Finding | Confidence Level |
|---|---|---|
| Primary Objective | Data exfiltration / secondary payload deployment | CONFIRMED |
| Technical Capabilities | In-memory execution, encrypted C2, registry manipulation, anti-VM | CONFIRMED |
| Malware Family | STEALC or related Go-based RAT/loader | LIKELY |
| Business Impact | High - Data theft, system compromise, persistence | CONFIRMED |
| Detection Difficulty | Medium-High - Uses legitimate software disguise | LIKELY |
| Remediation Complexity | High - Multiple persistence mechanisms | LIKELY |
Confidence Levels Summary
CONFIRMED (Highest Confidence):
- File hash identifiers and technical characteristics
- Go runtime metadata and compilation details
- Static analysis findings (capabilities, obfuscation techniques)
- Network infrastructure analysis and C2 endpoints
- Installer packaging and persistence mechanisms
LIKELY (Strong Evidence):
- STEALC family attribution (based on code patterns and behavior)
- Detection difficulty assessment (legitimate software disguise effectiveness)
- Remediation complexity (multiple persistence mechanisms)
POSSIBLE (Analytical Judgment):
- Specific threat actor attribution (requires additional intelligence)
- Exact infection vector distribution method
- Broader campaign context and scope
9. Incident Response Procedures
Priority 1: Initial Response
- ISOLATE affected systems from network immediately
- IDENTIFY all potentially compromised endpoints (6.68MB PS Remote Play installers)
- COLLECT forensic evidence before remediation
- NOTIFY security team and legal/compliance departments
- ASSESS data exposure scope and regulatory notification requirements
Priority 2: Investigation & Analysis
- FORENSIC ANALYSIS of collected memory dumps and disk images
- LOG ANALYSIS for lateral movement and data exfiltration
- REGISTRY ANALYSIS for persistence mechanisms
- NETWORK ANALYSIS for connections to C2 infrastructure
- USER INTERVIEWS to determine infection vector and timeline
Priority 3: Remediation & Recovery
- REBUILD affected systems from known-good images
- RESET all credentials for potentially compromised accounts
- UPDATE endpoint detection and response signatures
- DEPLOY enhanced monitoring for Go-based malware
- IMPLEMENT application whitelisting for temporary directories
10. Mitigation & Detection Recommendations
Network Security Controls
| Control | Implementation | Priority |
|---|---|---|
| Firewall Rules | Block 45.155.69[.]25:80 and similar suspicious IPs | CRITICAL |
| Proxy Filtering | Block HTTP POST to PHP paths without User-Agent headers | HIGH |
| DNS Filtering | Block known malicious domains and implement category filtering | MEDIUM |
Endpoint Detection & Response
| Detection Method | Implementation | Effectiveness |
|---|---|---|
| YARA Rules | Deploy rules for sunless/anesthetist strings and Go runtime patterns | HIGH |
| Behavioral Monitoring | Monitor executions from Temp/AppData named houselet.exe | HIGH |
| Registry Monitoring | Alert on IE ZoneMap/proxy configuration changes | MEDIUM |
| File Analysis | Scan for high-entropy Go binaries with Sony metadata | MEDIUM |
Long-term Defensive Strategy
- Application Whitelisting for temporary directories
- User Awareness Training on software installation risks
- Enhanced Code Signing verification for all executables
- Regular Security Assessments of Go-based applications
- Threat Intelligence Integration for emerging Go malware families
11. Operational Impact Assessment
Impact Scenarios
| Impact Category | Severity Level | Recovery Time |
|---|---|---|
| Data Compromise | HIGH | extended period |
| System Compromise | HIGH | several weeks |
| Operational Disruption | MEDIUM | several weeks |
| Compliance Impact | HIGH | extended period |
Operational Impact Timeline
- Immediate Response: System isolation, service disruption
- Investigation Phase: Forensic analysis and remediation planning
- Recovery Phase: System recovery and enhanced monitoring
- Long-term Phase: Process improvements and compliance activities
12. Long-term Defensive Strategy
Technology Enhancements
- Endpoint Protection Platform (EPP) with Go malware detection capabilities
- Extended Detection and Response (XDR) for comprehensive visibility
- Application Control to prevent unauthorized software execution
- Network Segmentation to limit lateral movement
- Cloud Security Posture Management for hybrid environments
Process Improvements
- Software Installation Policies requiring approval and verification
- Incident Response Playbooks specific to Go-based malware
- Regular Security Awareness Training on social engineering tactics
- Vendor Risk Management for third-party software suppliers
- Continuous Monitoring of emerging Go malware families
Organizational Measures
- Security Champions Program to promote security culture
- Regular Security Assessments including penetration testing
- Threat Intelligence Subscription for early warning capabilities
- Executive Security Briefings on emerging threats
- Investment in Security Tools and personnel training
13. Frequently Asked Questions
Technical Questions
Q: Why is Go-based malware particularly dangerous?
A: Go malware is cross-platform, statically linked (fewer dependencies), and harder to analyze due to Go’s runtime complexity and obfuscation capabilities.
Q: How can we detect similar threats in the future?
A: Implement behavioral analysis for unusual process execution, monitor for high-entropy Go binaries, and deploy YARA rules specific to Go malware patterns.
Q: What makes the PlayStation disguise effective?
A: Legitimate software branding reduces user suspicion, and PlayStation’s popularity among gamers makes it an attractive lure.
Business Questions
Q: Should we rebuild or clean infected systems?
A: REBUILD is strongly recommended due to multiple persistence mechanisms and potential for undiscovered malware components.
Q: What regulatory obligations might we have?
A: Depends on data types compromised. Consult legal counsel for GDPR, CCPA, HIPAA, or industry-specific requirements.
Q: How long will recovery take?
A: Full recovery typically several weeks for technical remediation, extended period including process improvements and compliance activities.
14. Conclusion
houselet.exe is a sophisticated Go-based loader/stealer employing in-memory payload deployment, encrypted C2 communication, and environment-aware evasion. Its combination of fake installer disguise, registry persistence, HTTP POST exfiltration, and runtime function obfuscation (via the sunless/anesthetist package) marks it as an evolving threat in the Go malware landscape.
Key Takeaways:
- Immediate containment and forensic investigation are critical
- System rebuilding is strongly recommended over cleaning
- Long-term defensive strategy requires technology, process, and organizational improvements
- Business impact can be significant without proper response planning
IOCs
Detections
License
© 2025 Joseph. All rights reserved.
Free to read, but reuse requires written permission.