: Captures keyboard inputs to monitor user activity and steal login data in real-time.

the file. If already opened, disconnect the machine from the network immediately.

The file is a malicious archive frequently used to deliver Agent Tesla , a sophisticated .NET-based Remote Access Trojan (RAT) and information stealer. Executive Summary

: Gathers hardware specifications, IP addresses, and operating system details.

Are you dealing with an on a machine, or are you performing proactive threat hunting ?

using an updated Endpoint Detection and Response (EDR) or Antivirus tool.