Poolfun_2.7z -

It establishes a connection to exfiltrate system data and receive further instructions [2, 5].

: Distributed via social engineering, frequently through LinkedIn or WhatsApp messages offering fake job opportunities at high-profile firms [1, 3]. Execution Chain : PoolFun_2.7z

: The file often uses password protection (e.g., password "123") to prevent automated sandbox scanning and email gateway detection [1, 6]. Risk Assessment It establishes a connection to exfiltrate system data