Concrete signature match: Trojan - Appears legitimate but performs malicious actions for VBA platform, family AgentTesla
This detection identifies the AgentTesla trojan, a well-known information stealer delivered via a VBA macro. The malware is designed to steal sensitive data such as keystrokes, clipboard content, and credentials from various applications. It uses encryption, as indicated by references to cryptographic libraries, to obfuscate the stolen data before exfiltration.
Relevant strings associated with this threat: - MultiToken.Resources (PEHSTR_EXT) - TripleDESCryptoServiceProvider (PEHSTR_EXT) - CryptoLibrary.dll (PEHSTR_EXT)
eea99f22aca1ebe449b97faafe79fd1d6e71441ccc40315a2e629280f65de0f8Isolate the affected machine from the network immediately to prevent lateral movement. Run a full antivirus scan to ensure all malicious components are removed. Since AgentTesla is an information stealer, reset all passwords and credentials that were used on the compromised host.