Captures screenshots or logs keystrokes to steal sensitive information.
Connects the infected computer to a Command and Control (C2) server, allowing attackers to use the machine for DDoS attacks or further malware distribution. Nude547.mp4
If you executed the file, treat your accounts as compromised and change your passwords from a different, clean device. Captures screenshots or logs keystrokes to steal sensitive