If you executed the file, assume your passwords have been compromised. Change them from a different, clean device, starting with your email and financial accounts.
Typically downloaded from a file-sharing site (e.g., MediaFire, Mega, or AnonFiles) after clicking a link provided in a chat or forum. malewhore.zip
Upon extraction and execution, the malware may perform a "process hollow" or inject code into legitimate Windows processes like explorer.exe or cvtres.exe . If you executed the file, assume your passwords
If you have already downloaded the file, delete it immediately without extracting its contents. If you executed the file
It attempts to contact a Command and Control (C2) server to upload your sensitive data. Recommended Actions
To harvest browser data (passwords, cookies, credit cards), Discord tokens, and cryptocurrency wallet information.