TinyLoader Malware: Crypto Theft & C2 Infrastructure
Published: 2025-09-02 · Archived: 2026-04-05 18:58:36 UTC
Malware loaders have become a common part of today’s cybercrime operations because they give attackers a
reliable way to get into systems and then bring in whatever tools they need. TinyLoader is one of these loaders. It
has been linked to stealing cryptocurrency and delivering other malware like Redline Stealer and DCRat.
Our investigation started with activity from IP address 176.46.152.47. What first looked like a single suspicious
host turned out to be part of a wider TinyLoader setup spread across several countries.
In this report we follow that trail, from the first indicator through to the panels, payloads, and infrastructure behind
the operation, and share insights that can help defenders detect and block it.
Key Takeaways
TinyLoader installs both Redline Stealer and cryptocurrency stealers to harvest credentials and hijack
transactions.
It spreads through USB drives, network shares, and fake shortcuts that trick users into opening it.
Persistence is maintained by creating hidden file copies and modifying registry settings.
The malware monitors the clipboard and instantly replaces copied crypto wallet addresses.
Its command and control panels are hosted across Latvia, the UK, and the Netherlands.
The same infrastructure also delivers DCRat payloads that provide remote access to infected systems.
With these findings in mind, the first step was to trace where the activity began, starting with the initial discovery
of a suspicious IP address that triggered the investigation.
Initial Discovery
After flagging this IP address for unusual activity, we decided to dig deeper into its origins and ownership.
Running it through our threat intelligence platform revealed some interesting details about who's behind this
address.
The IP 176.46.152.47 traces back to FEMO IT SOLUTIONS LIMITED, a company based in Riga, Latvia. The
lookup shows this falls under ASN214351, with the IP range 176.46.152.0/24 being allocated to this organization.
The geolocation pinpoints it to somewhere in the Baltic region, specifically Latvia, which matches the company's
registered location.
What immediately caught our attention in the scan results was the open ports and services running on this host.
The system appears to be running HTTP services on multiple ports - standard port 80, but also on non-standard
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 1 of 14
ports 1911 and 1912, plus TLS on port 3389. The timeline shows these services have been active for quite some
time, with some dating back to 2023.
Figure 1: Hunt.io scan results for suspicious IP address 176.46.152.47
However, one particular entry stood out like a red flag - port 1911 showing "Redline Stealer" in the Extra Info
column. This is where things get concerning. Redline Stealer is a well-known information-stealing malware
family, and seeing it explicitly identified in our scan results suggests this IP might be hosting malicious
infrastructure.
Web Content Analysis and Panel Discovery
To get a clearer picture of what this suspicious IP was actually hosting, we decided to run it through URLscan.io
to see what kind of web content was being served. The results confirmed our worst suspicions.
The scan revealed that 176.46.152.47 was hosting a login panel at the path /zyxic/login.php . The server details
show it's running Apache/2.4.58 on Windows 64-bit with OpenSSL/3.1.3 - a fairly standard web server setup, but
being used for malicious purposes.
Navigating directly to the suspicious URL, we were looking at an active TinyLoader malware panel. The simple
login interface at 176.46.152.47/zyxic/login.php serves as the command and control gateway for
cybercriminals managing their TinyLoader operations.
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 2 of 14
TinyLoader is a notorious malware loader that's commonly used to deploy secondary payloads like Redline
Stealer, which explains the connection we discovered in our initial port scan. This clean, functional panel design is
typical of modern malware-as-a-service operations, where threat actors prioritize usability to efficiently manage
their stolen data and coordinate botnet activities
Figure 2: TinyLoader command-and-control login panel
Threat Hunting and Infrastructure Expansion
Examining the page source revealed a crucial piece of intelligence for expanding our threat hunting efforts. The
HTML title tag clearly shows
Login - TinyLoader , which serves as a perfect signature for
identifying other instances of this malware family's infrastructure
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 3 of 14
Figure 3: Source code showing "Login - TinyLoader" panel title
Command and Control Infrastructure Mapping
To systematically hunt for additional TinyLoader infrastructure, a targeted SQL query was crafted to search
through the web crawler database.
SELECT
*
FROM
crawler
WHERE
body LIKE '%Login - TinyLoader%'
AND timestamp > NOW - 40 DAY
Copy
The query is designed to find any web pages that contain the specific "Login - TinyLoader" string anywhere in
their HTML body content within the last 40 days.
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 4 of 14
Figure 4: SQL query for identifying TinyLoader panels in crawler data
This approach leverages the distinctive title discovered in the source code analysis as the hunting signature. We
found a TinyLoader panel at IP address 176.46.152.46 that was captured just two days prior.
After mapping the panels, the next step was to examine related payloads tied to the infrastructure.
Payloads Linked to TinyLoader Infrastructure
After analyzing the communicating files associated with the suspicious IP addresses, the next logical step was to
examine the "Files Referring" section in VirusTotal. This feature reveals files that reference or contain mentions of
our target IPs, often uncovering additional payloads and related malware samples that might not have directly
communicated with the servers but are part of the same campaign.
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 5 of 14
Figure 5: VirusTotal relations revealing files linked to TinyLoader panel
By linking payloads back to the infrastructure, we were able to map not only the servers but also the malware’s
behavior. The next step was a detailed analysis of TinyLoader’s functionality and tactics.
Functional Analysis of TinyLoader
Secondary Payload Delivery
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 6 of 14
Upon execution, TinyLoader reaches out to six predefined attacker-controlled URLs to download additional
payloads. These payloads include files such as bot.exe and zx.exe , which are saved to the system's temporary
directory. Each file is executed instantly after being downloaded, effectively transforming the infected system into
a multi-purpose attack platform capable of running several malicious tools in parallel.
Figure 6: Malware function downloading secondary payloads
After connecting to one of the command and control servers, we discovered how the criminal infrastructure is
organized. The malware contacts four servers, and among the payloads retrieved, DCRat stood out as a major
component of this operation.
DCRat Open Directory Analysis
Two of the IP addresses function as admin panels where the attackers manage their criminal operation. These
servers host web interfaces that let the criminals monitor infected computers, track stolen cryptocurrency, and
control their malware distribution.
One server is dedicated to downloading RedLine Stealer malware. This means victims don't just get the
cryptocurrency clipper, they also get infected with additional malware that steals passwords, wallet files, and
personal information from their computers.
After extracting IP addresses from loader and running them through our threat intelligence platform, we
discovered several red flags. The scan revealed open directories and active C2 communication histories, showing
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 7 of 14
these IPs are definitely being used for malicious purposes.
The malware operators are running a distributed network across multiple countries. We found two IPs in Riga,
Latvia, one in London, UK, and another in Kerkrade, Netherlands. What's interesting is that all four addresses are
hosted by the same provider: Virtualine Technologies. This suggests the attackers are keeping things simple by
using one hosting company, though it also makes their infrastructure more vulnerable to takedowns.
The two Riga IPs are consecutive numbers, which means they're probably from the same server block. Combined
with the C2 traffic we detected and the open directories we found, it's clear this is a well-organized operation. The
criminals are smart enough to spread their infrastructure across different countries, making it harder for law
enforcement to shut them down quickly.
Figure 7: Hunt.io scan results of additional TinyLoader infrastructure
Based on this Attack Capture File Manager data, here's what we can add to our analysis:
Our AttackCapture™ tool captured active malware samples from one of the identified IPs (107.150.0.155) hosted
by Railnet LLC in Great Britain. The capture occurred on August 8th, 2025, revealing four malicious files totaling
211 KB. All captured files are tagged as DCRat malware, confirming this infrastructure is actively distributing
remote access trojans.
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 8 of 14
Figure 8: DCRat malware samples captured via Hunt.io AttackCapture™
The captured samples include:
injector.exe.DcRat (98 KB) - likely the main payload injector
c.exe.DcRat (49 KB) - possibly a configuration or communication module
index.php.DcRat (16 B) - a small PHP script, probably for web-based C2 communication
svchost.exe.DcRat (65 KB) - masquerading as a legitimate Windows service
This file capture proves the infrastructure isn't just hosting C2 servers, but actively serving malware payloads to
victims. The DCRat family is known for providing full remote control capabilities, including keylogging, screen
capture, and file theft.
The malware copies itself across multiple directories to maintain persistence. It drops copies named "Update.exe"
in your Desktop and Documents folders, then searches through every directory it can access to plant more copies.
Each copy gets marked as hidden, so you won't see them during normal browsing. This creates multiple backup
versions in case one gets deleted.
USB and Removable Media Infection
Every time you plug in a USB drive, the malware copies itself onto that device multiple times with tempting
names like "Photo.jpg.exe" and "Document.pdf.exe". It also creates an autorun file that causes the malware to
launch automatically when someone plugs the infected USB drive into another computer. Your innocent flash
drive becomes a weapon that infects other systems.
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 9 of 14
Figure 9: USB propagation and removable media infection behavior
It scans the local network for shared folders and drives it can access. Using your computer's existing permissions,
it copies itself to network shares as "Update.exe". This means if you're on a company network, the infection can
spread to servers and other computers throughout the organization.
How TinyLoader Maintains Persistence
When the malware has administrator rights, it does something particularly sneaky - it hijacks how Windows
handles text files. It modifies the registry so that every time you or anyone else opens a .txt file, the malware runs
first before the file opens normally. By hijacking text file associations, the malware blends persistence into one of
the most routine user actions.
Figure 10: Registry modification enabling persistence on Windows
Shortcut Tricks Used for Social Engineering
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 10 of 14
The malware creates a convincing shortcut on your desktop called "Documents Backup.lnk" with an official
Windows icon. The description says "Double-click to view contents" to trick you into thinking it's a helpful
backup tool. When you click it, you're running the malware, while it might show you something that looks
legitimate.
Figure 11: Fake desktop shortcut used for social engineering
Clipboard Monitoring and Crypto Address Hijacking
A hidden background process monitors the clipboard continuously, checking four times per second for any
changes while using minimal resources to avoid detection.
Figure 12: Clipboard monitoring process for cryptocurrency address theft
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 11 of 14
Whenever new text is copied, the malware analyzes it to identify cryptocurrency addresses for Bitcoin, Ethereum,
Litecoin, and TRON, validating the complete format to ensure it targets only genuine addresses. If a match is
found, it instantly replaces the address with the attacker's own, doing so faster than the user can notice and making
it appear identical to a legitimate address.
To achieve this, the malware uses Windows APIs to safely extract clipboard content, with built-in safeguards to
prevent crashes or conflicts with other applications, ensuring the process remains invisible and error-free.
Figure 13: Targeted cryptocurrency addresses monitored by TinyLoader
Taken together, these capabilities show how TinyLoader is more than a simple loader, acting instead as a persistent
and multi-layered threat.
Conclusion
This investigation uncovered an active TinyLoader malware operation that combines multiple attack methods to
steal cryptocurrency and personal information. The operation runs from servers in Latvia and uses a well-organized infrastructure with specific roles for each server.
The malware is designed to be persistent and hard to remove. It creates multiple copies of itself, spreads through
USB drives and networks, and uses fake shortcuts to trick users. Most concerning is its ability to steal
cryptocurrency by watching what users copy and instantly replacing wallet addresses with the attacker's addresses.
Our analysis shows this is a coordinated operation. The attackers combine persistence, lateral movement, and
crypto theft into a system designed to run silently and stay undetected.
Mitigation Strategies
Organizations should monitor network traffic for the HTML signature "Login - TinyLoader" to identify
related infrastructure and block known malicious IP addresses including 176.46.152.47, 176.46.152.46, and
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 12 of 14
107.150.0.155.
Implementing USB device restrictions, scanning policies, and monitoring for suspicious files like
"Update.exe" on network shares can prevent lateral movement. Security teams should watch for registry
changes affecting file associations and set up alerts for multiple executables being created in user
directories.
Individual users must verify cryptocurrency wallet addresses before sending transactions and remain
suspicious of desktop shortcuts claiming to be backup tools.
Scanning USB drives before opening files, especially executables disguised as documents with double
extensions like "Photo.jpg.exe", helps prevent infection.
Using antivirus software that monitors clipboard activity and regularly checking for hidden files in Desktop
and Documents folders provides additional protection.
Security teams can leverage this intelligence by searching web crawler databases for "Login - TinyLoader"
signatures to find additional infrastructure.
Implementing detection rules for high-frequency clipboard monitoring processes and monitoring Apache
servers with open directories containing malware components strengthens defensive capabilities. The
discovery of this infrastructure provides valuable intelligence for blocking similar operations and
protecting against cryptocurrency theft attacks.
TinyLoader IOCs
The following indicators of compromise (IOCs) were extracted during this investigation and can support detection
and blocking efforts.
IP Address City Country ASN
107.150.0.155 London GB AS214943
176.46.152.47 Riga LV AS214351
77.90.153.62 Kerkrade NL AS214943
176.46.152.46 Riga LV AS214351
File Name File Size Malware Family Description
injector.exe.DcRat 98 KB DCRat Main payload injector component
c.exe.DcRat 49 KB DCRat Configuration or communication module
index.php.DcRat 16 B DCRat Web-based C2 communication script
svchost.exe.DcRat 65 KB DCRat Masquerades as legitimate Windows service
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 13 of 14
Source: https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
https://hunt.io/blog/tinyloader-malware-cryptocurrency-theft-infrastructure
Page 14 of 14