Rus-129.7z May 2026
: Look for unusual PowerShell activity or unauthorized cmd.exe spawns originating from common archive software (like WinRAR or 7-Zip).
: The malware often creates a registry key under HKCU\Software\Microsoft\Windows\CurrentVersion\Run or schedules a task to ensure it survives system reboots. RUS-129.7z
: Alert staff to be wary of compressed archives with "RUS" or military-style naming conventions, especially when sent from unverified external addresses. : Look for unusual PowerShell activity or unauthorized cmd
: Typically delivered via spear-phishing emails with subjects referencing official Russian military or government documentation to lure targets into opening the attachment. Malware Analysis & Behavior Payload Delivery : : Add the specific filename RUS-129
: Consider blocking .7z and .rar attachments from external sources if they are not standard for your business operations.
: Inside the archive, there is often a double-extension file (e.g., RUS-129_Report.pdf.exe ) or a malicious LNK (shortcut) file. Payload Delivery :
: Add the specific filename RUS-129.7z to your email security blocklist.









0 comments