skip to Main Content

Cybercrime, new Agent Tesla campaign spread via “FW: Order”

Technical analysis by the Malware Hunter JAMESWT

New Agent Tesla campaign passes by an email with the subject “FW: Order”. The gz attachment contains an exe file: the malware itself. Stolen data is exfiltrated via FTP

New Agent Tesla campaign via email with the subject “FW: Order”.

The gz attachment contains an exe file: the malware itself. This, if open, activates the chain of infection. The stolen data is then exfiltrated via FTP.

Agent Tesla, through the keylogger function, is able to acquire everything the user types. Furthermore, it can steal browser emails and credentials and take screenshots. Finally, it has the ability to remotely issue commands on the infected PC, such as downloading additional payloads or updating existing ones.

Back To Top