Pl_bfrn.rar
The malware often uses "Process Hollowing" to inject code into legitimate Windows processes (like vbc.exe or RegAsm.exe ).
Analysis of similar samples (e.g., on ANY.RUN ) reveals the following characteristics: RAR Archive containing an executable (.exe). Malware Family: Agent Tesla (Spyware/Infostealer). PL_BFRn.rar
The file is identified as a malicious archive, typically associated with Agent Tesla or Guploader malware campaigns . These files are often distributed via phishing emails disguised as business documents like purchase orders or price lists (hence the "PL" prefix). 🛡️ Technical Summary The malware often uses "Process Hollowing" to inject
Connections to unusual SMTP ports (587, 465) or known malicious IP addresses. The file is identified as a malicious archive,
Stealing credentials, keystrokes, and clipboard data.
Scans for credentials in Outlook, Thunderbird, and FileZilla. Screenshots: Periodically captures the user's screen.
It creates scheduled tasks or registry keys to ensure it runs every time the computer starts. Data Theft Capabilities