If you’ve ever downloaded a cracked game launcher, a “mod,” or some shady “free tool,” this article is for you. Since May 2025, a new threat called Maranhão Stealer has been circulating—an infostealer written in Node.js that disguises itself as game installers or “free” utilities.
Its mission? To steal credentials, cookies, browser histories, and wallet data to hijack accounts and drain funds. And it uses advanced techniques like reflective DLL injection into browsers to bypass modern protections.
At TecnetOne, we’ll break down how it works, why it’s so dangerous, and what you can do to protect your home devices—and your company.
Attackers build social engineering websites hosted on cloud platforms, posing as game portals, “cheats,” or pirated software download hubs. The bait is usually a ZIP file with an Inno Setup installer—examples include names like Fnafdoomlauncher.exe, VersionX64_Setup.exe, RootedTheGameSetup.zip, etc.
Infection chain (Source: CYBLE)
Once executed:
Initial variant (left), New variant (right) (Source: CYBLE)
Also of interest: New Shamos Malware on Mac: Beware of ClickFix Attacks
Before stealing anything, it profiles your device using WMI queries—collecting OS version, CPU, GPU, disk, UUID—along with your IP address and geolocation to decide next steps.
Install files (Source: CYBLE)
It uses embedded C# in PowerShell to capture screenshots and store them as PNGs. This confirms user presence, reveals open apps, and monitors sensitive activity (email, banking, CRM, etc.).
Persistence through registry (Source: CYBLE)
This is its core strength. The malware launches your browser (Chrome, Edge, Brave, Opera, etc.) in headless mode and injects a DLL reflectively—without writing it to disk:
attrib.exe (Source: CYBLE)
While it targets browsers, it also scans for crypto wallets like Electrum, Exodus, Atomic, Coinomi, Guarda. If found, it attempts to drain balances or steal keys.
ip-api.com to collect the victim details (Source: CYBLE)
Screen capture (Source: CYBLE)
Mainly gamers and users of pirated software or cheats. But once inside, any work-related data is also at risk. If you use the same machine for gaming and work—SaaS tools, email, banking, CRM—all are vulnerable.
Stealing browser data (Source: CYBLE)
Read more: Lumma Infostealer Malware Targeting Opera in Mexico
Starts the browser in headless mode (Source: CYBLE)
Reflective Loader in chrome.exe (Source: CYBLE)
At TecnetOne, we help integrate Acronis with your SIEM/SOAR, fine-tune EDR detection, and simulate attacker chains to validate coverage.
Stolen data (Source: CYBLE)
C&C communication (Source: CYBLE)
Maranhão Stealer proves that infostealers have evolved—Node.js, stealthy packaging, reflective browser injection, and convincing lures. Today, your browser is your true perimeter.
If you secure it—and eliminate infection sources like pirated downloads—you massively reduce risk.
At TecnetOne, we help shift your defenses from reactive to proactive—with browser hardening, EDR tuning, and real-time threat hunting to stop credential theft in its tracks.