Check out our free Chrome Extension.

Poolfun_2.7z Apr 2026

The .7z archive contains a decoy document (e.g., a PDF resume) and a malicious executable [2].

: The file often uses password protection (e.g., password "123") to prevent automated sandbox scanning and email gateway detection [1, 6]. Risk Assessment PoolFun_2.7z

: Distributed via social engineering, frequently through LinkedIn or WhatsApp messages offering fake job opportunities at high-profile firms [1, 3]. Execution Chain : 3]. Execution Chain :