11. – 22. March 2026
Analysis of similar samples (e.g., on ANY.RUN ) reveals the following characteristics: RAR Archive containing an executable (.exe). Malware Family: Agent Tesla (Spyware/Infostealer).
The file is identified as a malicious archive, typically associated with Agent Tesla or Guploader malware campaigns . These files are often distributed via phishing emails disguised as business documents like purchase orders or price lists (hence the "PL" prefix). 🛡️ Technical Summary PL_BFRn.rar
Targets Chrome, Firefox, and Edge for saved passwords and cookies. Analysis of similar samples (e
Email attachments with double extensions (e.g., PL_BFRn.pdf.exe ). 🔍 Behavior Analysis Execution Flow Analysis of similar samples (e.g.
Check %AppData% or %Temp% for randomly named .exe files.
Connections to unusual SMTP ports (587, 465) or known malicious IP addresses.
The user extracts the RAR and runs the hidden executable.