Similar campaigns often distribute Lumina Stealer , RedLine Stealer , or Agent Tesla . These programs are designed to harvest: Stored browser passwords and credit card information. Cryptocurrency wallet data. System metadata and keystrokes.

Permanently delete the file from your system and empty the trash.

Session cookies for bypassing multi-factor authentication (MFA).

Base64 (used by attackers to bypass simple string-based security filters and email scanners). Likely Category: Malware / Phishing Attachment . Threat Assessment