skip to Main Content

Cybercrime, “Re: Payment Copy” email spreads new AgentTesla campaign

Technical analysis by the Malware Hunter JAMESWT

The email “Re: Payment Copy” spreads new AgentTesla campaign. The gz attachment contains an exe file: the malware itself. If opened, the chain of infection is activated. Stolen data is exfiltrated via smtp

“Re: Payment Copy” is the subject of a fake email from an Indian company, which aims to spread a new Agent Tesla campaign.

The gx attachment contains an exe file: the malware itself. This, if opened, activates the chain of infection and the stolen data is exfiltrated via smtp.

Agent Tesla, through the keylogger function, is able to acquire everything the user types. Furthermore, it can steal browser emails and credentials and take screenshots. Finally, it has the ability to remotely issue commands on the infected PC, such as downloading additional payloads or updating existing ones.

Back To Top