Blogs

AgentTesla

By camilla.ahlquist posted Jan 27, 2026 04:55 PM

  

Agent Tesla is a spyware that is capable of stealing personal data from web browsers, mail clients and FTP servers. It can also collect screenshots, videos and capture clipboard data. Recent versions of this malware are also capable of stealing personal data from VPN clients. It was being sold on the underground markets for as low as $12 up to $70 depending on the additional features.

This malware has been around since 2014. This malware kit was sold online first on the website agenttela.com ( defunct). It has evolved since then and is one of the main malware we see today. According to that site this malware is advertised as follows:

Interface of Agent Tesla

Price of AgentTesla as advertised in agenttesla.com in 2018

Attack Vector

Campaigns usually start with a phishing email with a malicious attachment. Based on the samples we found in September 2020, these campaigns target multiple industries related to shipping, supply chain and banks. In some cases, the attachments are archives, such as .iso, .rar or .uue like below:  

Phishing email that downloads Agent Tesla

In some cases, the attached files are Oce Documents that download the Agent Tesla loader.

Phishing email using Microsoft Oce files to download AgentTesla

Infection chain of VESSEL’ITENERARY.xlsm

File Structure

Agent Tesla is a .NET compiled malware and uses obfuscation and packing techniques to make reversing more dicult. It spawns a legitimate process RegSvcs.exe and injects into it using process hollowing.

 

Obfuscation

The malware strings are obfuscated which makes reversing more dicult. The encrypted strings are stored in a big array. This array is decrypted using the XOR algorithm with the key “170”.

Obfuscated .Net code of AgentTesla where strings are not easily readable making reverse engineering dicult

The strings array is decrypted using XOR algorithm with the key being “170”

Stealer

Using Sysinternal’s Procmon, we can monitor that this malware attempts to steal data from browsers including but not limited to login data, user and profiles data. It also tries to steal configuration files of known VPN, Mail and FTP applications. When executed, it spawns a legitimate RegSvcs.exe and inject into this process using a technique known as process hollowing.

Sysinternals’ Procmon capture of AgentTesla trying to steal browser data

 

AgentTesla reads into configurations and files of VPN, Mail and FTP to steal data.

Injects to a legitimate process RegSvcs.exe using process hollowing

Persistence

It drops a copy of itself in %APPDATA%\{Random Folder}\{Random Name.exe} and creates an autostart entry for it.

Registry entry added by AgentTesla to launch itself after reboot.

Exfiltration

AgenTesla exfiltrates stolen data via SMTP port 587. The email username and password is hardcoded in the malware and is part of the encrypted strings.

Code inside AgentTesla to exfiltrate stolen information using e-Mail

Email found in AgentTesla’s config for exfiltration

Indicators of Compromise

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  9fee6f84e42fa3b3acda0b73dc00e9dbe27aad6c40cc2648349db18060c772d8 e27488873055cd025a2c7d7e7cf06e2e835fdae05c541c615a17ba95e63e92c9  370cc8e35d3c703e64b14365721fc4dc7934114267b5cb00ec990f33ed15a105 119112a9a5e2a3bc5937c04c5a3fddc3c458b79c64cad5847d3676e22e3dd42b  8da8eb10715408f7b1c6106659d5e745794f16a3822a4d9182058a4d63c4c9237758708cd1ecbd77e513718fefef724eda610c4f7a56de57de9898f4a00ed92b  e7f0674c6ea5304e0941925dc2317c0a74f83efbb629e3f2fc50b07a5443a0e4 1419e6e95ec2fa298c5dcb021ae05e61718bb2ffb67319f5bfb1a1cf52946dfe 73151c61f8246474fbe25e286cd60dc5795c327ec001208faee1e46c1ca46304 ecae59c2b95ca86bd9f54fbef9825ce4b09ccf3ccd3a7ed2607fbf8ee7c53c4c 8a0bf1deba6fce4a6d42aad53ebcc1950f6e0d3053990d74aced1a4675be1071 

leell@scsgroups.com

0 comments
20 views

Permalink