: Upon extraction and execution of the executable file contained within, the malware attempts to steal sensitive information from the host machine, including browser credentials, keystrokes, and system metadata.
: If you have downloaded this file, do not extract its contents or run any files inside.
: It often creates a scheduled task or modifies registry "Run" keys to ensure it restarts after a system reboot. Key Findings