Connects to a remote Command & Control (C2) server to upload stolen data.

To bypass security and steal sensitive data from infected systems.

🚩 Malware names often rotate quickly. If this file was found in a business environment, isolate the machine from the network and alert your IT department. If you'd like more specific details: Where did you encounter this file? Have you already extracted or run it?

If you have this file, delete it immediately without extracting the contents.

Collects system info (computer name, OS version, hardware specs) to identify the target. 3. Detection & Evasion

If you suspect an infection, change your primary passwords (email, banking) from a different, clean device .

The archive typically contains a executable or script (like a .vbs or .js file).