Outbound traffic to suspicious domains using unusual User-Agents like Mozilla/4.08 (Charon; Inferno) . Recommended Actions
Targets over 100 different software tools to extract private information. Loki 1.8.rar
If you have interacted with this file, look for these common signs of infection: Loki 1.8.rar
Use a reputable antivirus tool like Malwarebytes or Bitdefender to perform a full system scan. Loki 1.8.rar
If you haven't opened the .rar file, delete it immediately.
Stolen data is sent to a remote Command and Control (C2) server via HTTP POST requests. Typical Indicators of Compromise (IOCs)
You can check if your credentials have already been compromised on Have I Been Pwned .