Based on recent cybersecurity intelligence, is identified as a malicious archive typically used in targeted social engineering campaigns , often attributed to North Korean threat actors (e.g., Lazarus Group or BlueNoroff). It masquerades as a legitimate Unity-based game build but contains a backdoor designed to exfiltrate data. Executive Summary
Disconnect the affected device from the network immediately to prevent data exfiltration.
While specific hashes can vary between versions, common indicators include: PingPong_Build.rar
The malware connects to a hardcoded Command & Control (C2) server to receive instructions and upload stolen system information. Indicators of Compromise (IOCs)
The game executable often side-loads a malicious DLL (e.g., UnityPlayer.dll or a custom library) included in the folder.
Non-standard or modified versions of version.dll , UnityPlayer.dll , or winmm.dll located within the same directory as the .exe .
Use an updated EDR (Endpoint Detection and Response) or antivirus solution to scan for remnants of the Unity-based backdoor.
Usually distributed via LinkedIn, Telegram, or email under the guise of a "coding test" or "game demo" for potential hires. Behavioral Characteristics: