Kaspersky cybersecurity experts: The malware, written in Rust, encrypts files on Windows, Linux and ESXi. It uses as encryption scheme an X25519-AES combination.
BleepingComputer cybersecurity experts: The malware group submitted a ZIP archive with the decryptors to VirusTotal and now it plans to switch to cryptojacking.
Reversing Labs cybersecurity experts: Who opened the malicious Word attachment is required to make multiple, additional clicks to activate the embedded malware.
Palo Alto Unit 42 cybersecurity experts: It allows an attacker to browse the file system, upload and download files, execute commands, and remove itself from the system.
NCC Group cybersecurity experts: The malware was leveraged to remotely create a temporary service on a target host, configured to execute the DLL using regsvr32.exe.