Upon execution, it injects code into legitimate Windows processes (like cvtres.exe or vbc.exe ) to hide its presence. 3. Malicious Capabilities Keystroke Logging: Records everything you type.
The file is a known malicious archive used in phishing campaigns to distribute malware, specifically Quasar RAT or Agent Tesla . 🛡️ Executive Summary Threat Type: Phishing / Trojan
The file often uses a PDF or Excel icon to trick users into clicking.
French-speaking users (due to the name "Facture" meaning "Invoice")
Once the user unzips the file, they find a file like Facture_2022_8492.exe .