Dark Mode Light Mode

As a RAT, it allows an attacker to control the infected machine, access files, or even use the webcam without the user's knowledge. Technical Characteristics

It is often compiled using PyInstaller, a tool that converts Python scripts into standalone Windows executables. While PyInstaller has legitimate uses, it is frequently used by malware authors to bundle malicious scripts.

Are you currently seeing this file on your computer, or are you for educational purposes? 5 simple ways to check if an .exe file is safe. - GlassWire

Avoid opening the file, as it may silently install itself and begin exfiltrating data.

You can upload the file (or its hash) to VirusTotal to see if multiple antivirus engines flag it as malicious.

If you encounter on your system, it is highly likely to be a threat. Experts recommend taking the following steps:

It may monitor the system's clipboard to replace cryptocurrency wallet addresses with an attacker’s address during transactions.

The "TSC" in the filename likely stands for "Token Stealer & Clipper," reflecting its primary functions: