Katalóg produktov

Pl_bfrn.rar

The malware often uses "Process Hollowing" to inject code into legitimate Windows processes (like vbc.exe or RegAsm.exe ).

The user extracts the RAR and runs the hidden executable.

Targets Chrome, Firefox, and Edge for saved passwords and cookies. PL_BFRn.rar

Scans for credentials in Outlook, Thunderbird, and FileZilla. Screenshots: Periodically captures the user's screen.

Email attachments with double extensions (e.g., PL_BFRn.pdf.exe ). 🔍 Behavior Analysis Execution Flow The malware often uses "Process Hollowing" to inject

Stealing credentials, keystrokes, and clipboard data.

Analysis of similar samples (e.g., on ANY.RUN ) reveals the following characteristics: RAR Archive containing an executable (.exe). Malware Family: Agent Tesla (Spyware/Infostealer). PL_BFRn.rar

Look for new entries in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run .