: If executed, disconnect the device from the internet to stop data exfiltration.

: Scans for browser extensions and local wallet files (e.g., MetaMask, Exodus).

: If you still have the .rar file, delete it immediately without opening it.

: New, hidden folders in %AppData% containing .txt or .json files ready for upload. Recommended Actions

: Upon extraction and execution, the malware often copies itself to the %AppData% or %LocalAppData% folders and creates a Scheduled Task or Registry Run Key to ensure it starts with Windows.