Typically contains a malicious executable or script designed to install a RAT.

Uses obfuscation techniques to bypass basic antivirus signatures. 🛑 Mitigation and Recovery

Primarily observed in Spanish-speaking regions (the name translates to "Gypsy Wedding"). ☣️ Infection Chain

Users receive a phishing email with a link to download a file or an attachment masquerading as wedding photos or invitations.

The RAT connects to a Command and Control (C2) server to receive instructions, exfiltrate data, or download further payloads. 🔍 Technical Capabilities

If infected, isolate the host from the network, terminate the malicious process, and perform a full system wipe.