When a Steam "Update" Becomes a Wallet Drainer: Inside the BlockBlasters Malware

Investigation Published: Sep 23, 2025
TL;DR: The Steam game BlockBlasters pushed a malicious patch on Aug 30 that dropped a stealer/backdoor chain. It scraped browser data and crypto wallet info, then exfiltrated it to attacker C2s—leading to six-figure losses, including a high-profile $32K theft from a streamer. Valve has since removed the title.

The timeline

Steam store showing BlockBlasters and other games

Steam store interface - the platform where BlockBlasters was distributed before removal

How the infection chain worked

Stage 1 — Batch dropper & data grab

A batch file (game2.bat) executed on launch. It queried the victim's IP/geo, enumerated AV processes, grabbed Steam login artifacts (SteamID, AccountName, PersonaName), and uploaded them to a C2 endpoint. It then unpacked password-protected ZIPs (password 121) to stage further payloads.

Stage 2 — VBS launchers

Two VBS scripts (launch1.vbs and test.vbs) invisibly executed additional batch files, continuing collection of browser extension and wallet info, and maintaining contact with the C2.

Stage 3 — Defender exclusion + payload execution

The script added the payload directory to Microsoft Defender's exclusions, then unpacked and launched two executables: a backdoor (Client-built2.exe) and a stealer (Block1.exe).

The stealer: StealC

StealC (Win64) targeted Chromium-based browsers (Chrome, Edge, Brave), extracting "Local State" data and other artifacts used to decrypt stored credentials and wallet extension data. It communicated with a separate C2 for exfiltration.

How wallets were drained

Victims with hot wallets (browser extensions or locally stored keys) were especially exposed. Once StealC exfiltrated extension storage, cookies, and key material, attackers could immediately:

Who was hit (known cases)

Coverage to date cites aggregate losses of >$150,000, including a public case where streamer Raivo "Rastaland" Plavnieks lost roughly $32,000 while fundraising for cancer treatment.

Indicators of Compromise (IOCs)

ArtifactExample / Note
Batch droppergame2.bat (SHA256: aa1a1328…b73b3) — collects Steam login fields, queries IP, uploads to C2 hxxp://203[.]188[.]171[.]156:30815/upload
VBS launcherslaunch1.vbs, test.vbs — silent runners for subsequent .bat payloads
Defender bypassDirectory exclusion added for payload folder before execution
Main payloadsClient-built2.exe (backdoor) & Block1.exe (StealC stealer)
Archive trickPassword-protected ZIPs (password 121) to hinder static scanning
StealC C2Separate exfil endpoint (e.g., hxxp://45[.]83[.]28[.]99)

Defensive takeaways for gamers

Pattern, not a one-off

This follows earlier Steam incidents (e.g., Chemia) where info-stealers (Fickle, Vidar) and loaders (HijackLoader) were embedded—evidence that Steam updates and playtest builds are a rising supply-chain target.

Credits & Sources

© Third Degree Media — zero trackers, all signal.