: Often attached to emails disguised as "Payment Advice," "Invoices," or "Shipping Documents."

: To steal sensitive information, including browser credentials, keystrokes, and system data.

: If you have already interacted with the file, run a full system scan using a reputable antivirus tool.

Modifies registry keys for persistence and connects to Command & Control (C2) servers.

Highly detected by major antivirus engines (e.g., BitDefender, Kaspersky, Microsoft Defender). Recommendations