The executable typically attempts to connect to a Command and Control (C2) server via HTTP or SMTP to exfiltrate the stolen data.
Use an updated antivirus like Microsoft Defender or Malwarebytes to perform a full system scan.
Often flagged as a Trojan or Spyware (specifically variants like AgentTesla or Formbook ).
If you are analyzing this for research, ensure you are using a dedicated Sandbox Environment with networking disabled. AI responses may include mistakes. Learn more
The malware may attempt to copy itself to the %AppData% or %Temp% folders and create a registry key to ensure it runs every time the system starts.
If you have encountered this file, avoid extracting the contents or running any included executables.