May disable antivirus software to remain persistent. Analysis Overview Analysis of similar samples shows high-risk behavior:
Often bundled with remote access trojans (RATs).
Can steal your browser saved passwords or crypto wallets.
Attempts to contact unknown command-and-control (C2) servers.