The malware is downloaded and activated by one of the two files contained within the executable. Goal: to reduce the chance of being detected and stopped.
The cyber security experts: It’s present in online forums-torrent sites linked to MacOS software. The malware incorporates a keylogger, a reverse shell and can empty cryptocurrency wallets.