N4tx83qgxatkkuxuplaw.zip

Include MD5, SHA-1, and SHA-256 hashes to uniquely identify the sample. You can verify these against databases like VirusTotal .

Describe the behavior observed when the sample is run in a secure, isolated sandbox environment. N4Tx83qgxATKkUXuPLaw.zip

Specific IP addresses or domains the malware contacts. Include MD5, SHA-1, and SHA-256 hashes to uniquely

(e.g., Trojan, Ransomware, or Spyware) Risk Level: High/Critical or Spyware) Risk Level: High/Critical