It establishes persistence by modifying registry keys or creating scheduled tasks to ensure it runs upon system reboot.

: Gathers hardware specifications, IP addresses, and operating system details.

: Targets web browsers, FTP clients, and email applications to extract saved passwords.

: Look for unusual entries in Startup folders or Task Scheduler that point to temp directories.

Upon execution, the malware may use "process hollowing" to inject its malicious code into a legitimate Windows process (like RegAsm.exe or vbc.exe ) to evade detection.

: Captures keyboard inputs to monitor user activity and steal login data in real-time.

The file is a malicious archive frequently used to deliver Agent Tesla , a sophisticated .NET-based Remote Access Trojan (RAT) and information stealer. Executive Summary