Collects hardware specifications, IP addresses, usernames, and a list of installed applications.
Attempts to bypass basic security software to establish a connection with a Remote Command & Control (C2) server, where it uploads the stolen data. Common Infection Vectors dindwapo.rar
RAR Archive (often containing a disguised executable like .exe or .scr ) Threat Category: Infostealer / Trojan Technical Analysis Collects hardware specifications