It scans for Chromium and Gecko-based browsers to steal history, cookies, auto-fill data, and saved passwords.
Immediately disable Wi-Fi or unplug ethernet cables to prevent the malware from sending your stolen data to the attacker's server.
If you haven't opened the .zip yet, delete it immediately and empty your recycle bin.
Use the Autoruns utility to identify and delete suspicious startup entries associated with the malware.
The file is a malicious archive used to distribute the Storm Information Stealer (also known as "Storm"). This malware is designed to stealthily infiltrate Windows systems to harvest sensitive data, including browser passwords, credit card details, and cryptocurrency wallet information. Immediate Action: If You Downloaded This File
It harvests tokens and data from communication apps like Telegram, Discord, WhatsApp, and Signal .