MALICIOUS (1) campaign cataloged at 2026-02-14(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-02-dzuseragents¶
The package downloads an executable and adds it to autostart. The downloaded application then periodically creates a screenshot and sends it to a Discord channel, as well as waits for further instructions
Abuse categories¶
peristence_autorun
Campaign uses peristence_autorun.
remote_executable
Downloads and executes a remote executable.
spyware-like
Campaign uses spyware-like.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
hxxps://dzflavors.com/Event%20Service.exe