Often spread via phishing emails containing malicious links or "invoice" attachments. ⚠️ Key Technical Insights 1. Delivery & Execution

If you have this file, delete it immediately without extracting the contents.

Collects system info (computer name, OS version, hardware specs) to identify the target. 3. Detection & Evasion

Perform a full system scan using a reputable tool like Malwarebytes or Windows Defender .