It checks for the presence of debuggers, sandboxes, or virtual machines (VMs). If detected, it may terminate to avoid analysis. B. Data Harvesting (Infostealing) The malware scans the local system for:

Targets browser extensions like MetaMask or desktop wallets (e.g., Atomic, Exodus).

Check %AppData% or %LocalAppData% for randomly named folders containing .sqlite or .txt files (logs of stolen data).

Below is a detailed technical breakdown structured like an analysis paper.