Rus-129.7z Site
: Alert staff to be wary of compressed archives with "RUS" or military-style naming conventions, especially when sent from unverified external addresses.
: Look for unusual PowerShell activity or unauthorized cmd.exe spawns originating from common archive software (like WinRAR or 7-Zip). RUS-129.7z
: Common payloads associated with this naming convention include information stealers that target browser credentials, crypto wallets, and session cookies. Geopolitical Context : Alert staff to be wary of compressed
: Typically delivered via spear-phishing emails with subjects referencing official Russian military or government documentation to lure targets into opening the attachment. Malware Analysis & Behavior Technical Summary File Name : RUS-129
: Inside the archive, there is often a double-extension file (e.g., RUS-129_Report.pdf.exe ) or a malicious LNK (shortcut) file. Payload Delivery :
Based on current threat intelligence and technical indicators, is a malicious compressed archive identified as part of targeted phishing or cyber-espionage campaigns, often associated with geopolitical themes involving Russia and Eastern Europe. Technical Summary File Name : RUS-129.7z Extension : .7z (7-Zip compressed archive) Primary Threat Category : Trojan / Stealer / Downloader