The Hunter's Ledger
Detection Rules · November 17, 2025

Detection Rules Houselet.exe - The Go-Based Loader Masquerading as PlayStation Remote Play

Contents

Execution Layer

Suspicious Process Execution from Temp

This rule looks for executions of houselet.exe from the Temp directory, which is highly unusual for legitimate software.

title: houselet.exe Execution from Temp
logsource:
  category: process_creation
detection:
  selection:
    Image|contains: "\AppData\Local\Temp\houselet.exe"
condition: selection
level: high

Suspicious Self-Spawn Behavior

Malware often respawns itself to evade termination. This rule detects houselet.exe spawning itself with explorer.exe as parent.

title: Self-Spawned houselet.exe
logsource:
  category: process_creation
detection:
  selection:
    ParentImage|endswith: "explorer.exe"
    Image|endswith: "houselet.exe"
condition: selection
level: high

Persistence Layer

Registry Modification for IE ZoneMap

Houselet modifies Internet Explorer ZoneMap keys to bypass restrictions. This rule flags suspicious registry changes.

title: IE ZoneMap Registry Modification
logsource:
  category: registry
detection:
  selection:
    TargetObject|contains: "HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap"
condition: selection
level: medium

Registry Modification for Proxy Settings

The malware alters proxy settings to hide traffic. This rule detects changes to proxy-related registry keys.

title: Proxy Registry Modification
logsource:
  category: registry
detection:
  selection:
    TargetObject|contains: "HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Proxy"
condition: selection
level: medium

Network Layer

Suspicious HTTP POST to PHP Endpoint

Legitimate installers rarely POST to PHP scripts. This rule detects outbound POST requests to PHP endpoints.

title: HTTP POST to PHP C2
logsource:
  category: proxy
detection:
  selection:
    uri|endswith: ".php"
    http.method: "POST"
condition: selection
level: high

Outbound Traffic to Known C2 IP

This rule directly monitors traffic to the known C2 IP 45.155.69.25.

title: Outbound Traffic to 45.155.69.25
logsource:
  category: proxy
detection:
  selection:
    dst_ip: "45.155.69.25"
condition: selection
level: critical

Memory & Crypto Layer

RWX Memory Allocation

Houselet allocates memory with Read/Write/Execute permissions for in-memory payloads. This rule detects RWX allocations.

title: RWX Memory Allocation by Go Binary
logsource:
  category: sysmon
detection:
  selection:
    CallTrace|contains: "VirtualAlloc"
condition: selection
level: high

Use of Cryptographic Functions

The malware uses AES, RC4, and Base64 for obfuscation. This rule detects suspicious crypto API calls.

title: Suspicious Crypto API Usage
logsource:
  category: sysmon
detection:
  selection:
    CallTrace|contains:
      - "CryptEncrypt"
      - "CryptAcquireContext"
      - "BCryptEncrypt"
condition: selection
level: medium

Evasion & Impersonation Layer

Fake Sony Metadata

Houselet pretends to be a Sony installer. This rule detects binaries with Sony metadata but unsigned/self-signed certificates.

title: Fake Sony Metadata
logsource:
  category: file
detection:
  selection:
    file.description|contains: "Sony Interactive Entertainment"
    signature.status: "Untrusted"
condition: selection
level: medium

Anti-VM Checks

The malware performs anti-VM checks. This rule detects suspicious registry or process queries typical of VM detection.

title: Anti-VM Behavior
logsource:
  category: sysmon
detection:
  selection:
    Image|contains: "houselet.exe"
    CommandLine|contains:
      - "VBoxService"
      - "vmtoolsd"
      - "qemu"
condition: selection
level: medium

Summary

These detection rules cover:

  • Execution from Temp and self-spawning behavior
  • Registry persistence via IE ZoneMap and proxy keys
  • Network beaconing to PHP endpoints and known C2 IP
  • Memory allocation with RWX permissions and suspicious crypto usage
  • Evasion tactics like fake Sony metadata and anti-VM checks

License

Detection rules are licensed under Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Free to use in your environment, but not for commercial purposes.

Support Independent Threat Research

If this report was useful, consider supporting the work that goes into it.