
In total, Agent Tesla can snatch data from over 70 applications, with the most popular ones listed below.Įpic Privacy, Uran, Chedot, Comodo Dragon, Chromium, Orbitum, Cool Novo, Sputnik, Coowon, Brave, Liebao Browser, Elements Browser, Sleipnir 6, Vivaldi, 360 Browser, Torch Browser, Yandex Browser, QIP Surf, Amigo, Kometa, Citrio, Opera Browser, CentBrowser, 7Star, Coccoc, and Iridium BrowserĬhrome, Microsoft Edge, Firefox, Safari, IceCat, Waterfox, Tencent QQBrowser, Flock Browser, SeaMonkey, IceDragon, Falkon, UCBrowser, Cyberfox, K-Meleon, PaleMoon The attacker can choose which features to enable during the payload compilation, thus choosing between a balance of power and stealthiness. Source: Fortinet Targeting a range of productsĪgent Tesla features a keylogger, a browser cookie and saved credentials stealer, a Clipboard data sniffer, and even a screenshot tool. By injecting the file into RegAsm.exe, Agent Tesla can operate in the infected system file-less, so the chances of being detected drop significantly.Īlso Read: 5 Tips In Using Assessment Tools To A Successful Businesses Agent Tesla payload deployed in a process
#Foxmail phishing windows
NET RegAsm.exe executable via four Windows API functions. The malware is injected into the legitimate Microsoft.

#Foxmail phishing code

Net-based info-stealer that has been circulating the internet for many years but remains a threat in the hands of phishing actors. Phishing Campaign Uses PowerPoint Macros to Drop Agent TeslaĪ new variant of the Agent Tesla malware has been spotted in an ongoing phishing campaign that relies on Microsoft PowerPoint documents laced with malicious macro code.Īgent Tesla is a.
