The malware uses "obfuscation" to hide its code from basic antivirus scans and "process hollowing" to run its malicious code inside legitimate Windows processes. Indicators of Compromise (IoCs)
For detailed technical breakdowns of similar campaigns, you can refer to resources like The DFIR Report . The DFIR Report | Actionable Cyber Threat Intelligence VID-20230123-WA0113mp4
Stealing information you have copied and pasted. The malware uses "obfuscation" to hide its code