Concrete signature match: Trojan - Appears legitimate but performs malicious actions for VBScript platform, family AgentTesla
This is a concrete detection of a VBScript-based AgentTesla Trojan, a well-known info-stealer and keylogger. It leverages various Windows utilities like rundll32, PowerShell, mshta, and scheduled tasks for execution, persistence, hooking, and data encoding, potentially exfiltrating sensitive information to hardcoded suspicious URLs.
Relevant strings associated with this threat: - "tp://1230912489%1230192309@j.mp/" (MACROHSTR_EXT) - "tp://1230948%1230948@j.mp/" (MACROHSTR_EXT) - "23bbsdajs821" (MACROHSTR_EXT) - =opera.x+opera.y+textfileforyou.z+textfileforyou.d+hi.openmarket+hi.xxx+hi.k+hi.t (MACROHSTR_EXT) - textfilestuff.mosuf.tagendfunction (MACROHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
31f1da01a4339df756a8ebdcd2e933f4d3967d2beadc76098a36e4e60d4c7a311180ed9832f2127292c76ee0660864b6f539a38ed539e62c74fcfe96d044b105590bd2abfd260783e797c1d2afe52b6655c5d9d4e3ff9429e0574ec5e507c776Immediately isolate the infected system from the network. Perform a full scan with updated antivirus, remove all detected threats, and reset all credentials used on the compromised machine. Investigate for persistence mechanisms, C2 communication, and data exfiltration.