Agent Tesla

Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]

ID: S0331
Type: MALWARE
Platforms: Windows
Version: 1.3
Created: 29 January 2019
Last Modified: 11 September 2023

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

Agent Tesla has used wmi queries to gather information from the system.[2]

Enterprise T1555 从密码存储中获取凭证

Agent Tesla has the ability to steal credentials from FTP clients and wireless profiles.[3]

.003 Credentials from Web Browsers

Agent Tesla can gather credentials from a number of browsers.[2]

Enterprise T1112 修改注册表

Agent Tesla can achieve persistence by modifying Registry key entries.[4]

Enterprise T1115 剪贴板数据

Agent Tesla can steal data from the victim’s clipboard.[5][1][6][2]

Enterprise T1140 反混淆/解码文件或信息

Agent Tesla has the ability to decrypt strings encrypted with the Rijndael symmetric encryption algorithm.[3]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Agent Tesla can add itself to the Registry as a startup program to establish persistence.[1][4]

Enterprise T1562 .001 妨碍防御: Disable or Modify Tools

Agent Tesla has the capability to kill any running analysis processes and AV software.[6]

Enterprise T1203 客户端执行漏洞利用

Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.[4]

Enterprise T1113 屏幕捕获

Agent Tesla can capture screenshots of the victim’s desktop.[5][7][1][6][2]

Enterprise T1071 .001 应用层协议: Web Protocols

Agent Tesla has used HTTP for C2 communications.[7][6]

.003 应用层协议: Mail Protocols

Agent Tesla has used SMTP for C2 communications.[8][6][2]

Enterprise T1560 归档收集数据

Agent Tesla can encrypt data with 3DES before sending it over to a C2 server.[5]

Enterprise T1048 .003 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol

Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.[5][2][4]

Enterprise T1552 .001 未加密凭证: Credentials In Files

Agent Tesla has the ability to extract credentials from configuration or support files.[4]

.002 未加密凭证: Credentials in Registry

Agent Tesla has the ability to extract credentials from the Registry.[4]

Enterprise T1185 浏览器会话劫持

Agent Tesla has the ability to use form-grabbing to extract data from web data forms.[2]

Enterprise T1027 混淆文件或信息

Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult.[1] Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.[3]

Enterprise T1204 .002 用户执行: Malicious File

Agent Tesla has been executed through malicious e-mail attachments [2]

Enterprise T1218 .009 系统二进制代理执行: Regsvcs/Regasm

Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.[4]

Enterprise T1082 系统信息发现

Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.[1][6][3]

Enterprise T1033 系统所有者/用户发现

Agent Tesla can collect the username from the victim’s machine.[7][1][3]

Enterprise T1124 系统时间发现

Agent Tesla can collect the timestamp from the victim’s machine.[7]

Enterprise T1016 系统网络配置发现

Agent Tesla can collect the IP address of the victim machine and spawn instances of netsh.exe to enumerate wireless settings.[7][4]

.002 Wi-Fi Discovery

Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.[3]

Enterprise T1497 虚拟化/沙盒规避

Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks.[3]

Enterprise T1125 视频捕获

Agent Tesla can access the victim’s webcam and record video.[7][5]

Enterprise T1087 .001 账号发现: Local Account

Agent Tesla can collect account information from the victim’s machine.[7]

Enterprise T1105 输入工具传输

Agent Tesla can download additional files for execution on the victim’s machine.[5][7]

Enterprise T1056 .001 输入捕获: Keylogging

Agent Tesla can log keystrokes on the victim’s machine.[5][7][6][2][4]

Enterprise T1057 进程发现

Agent Tesla can list the current running processes on the system.[6]

Enterprise T1055 进程注入

Agent Tesla can inject into known, vulnerable binaries on targeted hosts.[4]

.012 Process Hollowing

Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code.[4]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

The primary delivered mechanism for Agent Tesla is through email phishing messages.[2]

Enterprise T1564 .001 隐藏伪装: Hidden Files and Directories

Agent Tesla has created hidden folders.[4]

.003 隐藏伪装: Hidden Window

Agent Tesla has used ProcessWindowStyle.Hidden to hide windows.[3]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

Agent Tesla has achieved persistence via scheduled tasks.[4]

Groups That Use This Software

ID Name References
G0083 SilverTerrier

[9]

G1018 TA2541

[10]

References