{"id":173859,"date":"2023-09-08T08:47:49","date_gmt":"2023-09-08T15:47:49","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=173859"},"modified":"2023-09-15T09:25:40","modified_gmt":"2023-09-15T16:25:40","slug":"agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/","title":{"rendered":"Agent Tesla&#8217;s Unique Approach: VBS and Steganography for Delivery and Intrusion"},"content":{"rendered":"<p>Authored by Yashvi Shah<\/p>\n<p>Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable of recording keystrokes, extracting clipboard content, and searching the disk for valuable data. The acquired information can be transmitted to its command-and-control server via various channels, including HTTP(S), SMTP, FTP, or even through a Telegram channel.<\/p>\n<p>Generally, Agent Tesla uses deceptive emails to infect victims, disguising as business inquiries or shipment updates. Opening attachments triggers malware installation, concealed through obfuscation. The malware then communicates with a command server to extract compromised data.<\/p>\n<p>The following heat map shows the current prevalence of Agent Tesla on field:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173860 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/heatmap.png\" alt=\"\" width=\"1137\" height=\"690\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/heatmap.png 1137w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/heatmap-300x182.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/heatmap-1024x621.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/heatmap-768x466.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/heatmap-205x124.png 205w\" sizes=\"auto, (max-width: 1137px) 100vw, 1137px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1: Agent Tesla heat map<\/em><\/p>\n<p>McAfee Labs has detected a variation where Agent Tesla was delivered through VBScript (VBS) files, showcasing a departure from its usual methods of distribution. VBS files are script files used in Windows for automating tasks, configuring systems, and performing various actions. They can also be misused by cybercriminals to deliver malicious code and execute harmful actions on computers.<\/p>\n<h2><strong>Technical Analysis<\/strong><\/h2>\n<p>The examined VBS file executed numerous PowerShell commands and then leveraged steganography to perform process injection into RegAsm.exe as shown in Figure 2. Regasm.exe is a Windows command-line utility used to register .NET assemblies as COM components, allowing interoperability between different software. It can also be exploited by malicious actors for purposes like process injection, potentially enabling covert or unauthorized operations.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173874 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Injection_chain.png\" alt=\"\" width=\"1348\" height=\"623\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Injection_chain.png 1348w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Injection_chain-300x139.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Injection_chain-1024x473.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Injection_chain-768x355.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Injection_chain-205x95.png 205w\" sizes=\"auto, (max-width: 1348px) 100vw, 1348px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2: Infection Chain<\/em><\/p>\n<p>VBS needs scripting hosts like wscript.exe to interpret and execute its code, manage interactions with the user, handle output and errors, and provide a runtime environment. When the VBS is executed, wscript invokes the initial PowerShell command.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173888 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/ProcessTree.png\" alt=\"\" width=\"992\" height=\"186\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/ProcessTree.png 992w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/ProcessTree-300x56.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/ProcessTree-768x144.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/ProcessTree-205x38.png 205w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3: Process Tree<\/em><\/p>\n<h3><strong>First PowerShell command<\/strong><\/h3>\n<p>The first PowerShell command is encoded as illustrated here:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173930 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/First-Powershell.png\" alt=\"\" width=\"1826\" height=\"820\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/First-Powershell.png 1826w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/First-Powershell-300x135.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/First-Powershell-1024x460.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/First-Powershell-768x345.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/First-Powershell-1536x690.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/First-Powershell-205x92.png 205w\" sizes=\"auto, (max-width: 1826px) 100vw, 1826px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4: Encoded First PowerShell<\/em><\/p>\n<p>Obfuscating PowerShell commands serves as a defense mechanism employed by malware authors to make their malicious intentions harder to detect. This technique involves intentionally obfuscating the code by using various tricks, such as encoding, replacing characters, or using convoluted syntax. This runtime decoding is done to hide the true nature of the command from static analysis tools that examine the code without execution. Upon decoding, achieved by substituting occurrences of &#8216;#@$#&#8217; with &#8216;A&#8217; and subsequently applying base64-decoding, we successfully retrieved the decrypted PowerShell content as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173916 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Decoded-first-powershell-1.png\" alt=\"\" width=\"1825\" height=\"287\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Decoded-first-powershell-1.png 1825w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Decoded-first-powershell-1-300x47.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Decoded-first-powershell-1-1024x161.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Decoded-first-powershell-1-768x121.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Decoded-first-powershell-1-1536x242.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Decoded-first-powershell-1-205x32.png 205w\" sizes=\"auto, (max-width: 1825px) 100vw, 1825px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5: Decoded content<\/em><\/p>\n<h3><strong>Second PowerShell Command<\/strong><\/h3>\n<p>The deciphered content serves as the parameter passed to the second instance of PowerShell..<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173944 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Second-PowerShell-1024x209.png\" alt=\"\" width=\"1024\" height=\"209\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Second-PowerShell-1024x209.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Second-PowerShell-300x61.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Second-PowerShell-768x156.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Second-PowerShell-1536x313.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Second-PowerShell-205x42.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Second-PowerShell.png 1822w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6: Second PowerShell command<\/em><\/p>\n<p>Deconstructing this command line for clearer comprehension:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173958 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/disassembled-command.png\" alt=\"\" width=\"1797\" height=\"575\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/disassembled-command.png 1797w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/disassembled-command-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/disassembled-command-1024x328.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/disassembled-command-768x246.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/disassembled-command-1536x491.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/disassembled-command-205x66.png 205w\" sizes=\"auto, (max-width: 1797px) 100vw, 1797px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7: Disassembled command<\/em><\/p>\n<h3><strong>Steganography <\/strong><\/h3>\n<p>As observed, the PowerShell command instructs the download of an image, from the URL that is stored in variable &#8220;imageURL.&#8221; The downloaded image is 3.50 MB in size and is displayed below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174269 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Downloaded-Image.png\" alt=\"\" width=\"800\" height=\"594\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Downloaded-Image.png 800w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Downloaded-Image-300x223.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Downloaded-Image-768x570.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Downloaded-Image-174x129.png 174w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 8: Downloaded image<\/em><\/p>\n<p>This image serves as the canvas for steganography, where attackers have concealed their data. This hidden data is extracted and utilized as the PowerShell commands are executed sequentially. The commands explicitly indicate the presence of two markers, &#8216;&lt;&lt;BASE64_START&gt;&gt;&#8217; and &#8216;&lt;&lt;BASE64_END&gt;&gt;&#8217;. The length of the data is stored in variable \u2018base64Length\u2019. The data enclosed between these markers is stored in \u2018base64Command\u2019. The subsequent images illustrate these markers and the content encapsulated between them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173986 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Steganography.png\" alt=\"\" width=\"1236\" height=\"420\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Steganography.png 1236w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Steganography-300x102.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Steganography-1024x348.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Steganography-768x261.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Steganography-205x70.png 205w\" sizes=\"auto, (max-width: 1236px) 100vw, 1236px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 9: Steganography<\/em><\/p>\n<p>After obtaining this data, the malware proceeds with decoding procedures. Upon examination, it becomes apparent that the decrypted data is a .NET DLL file. In the subsequent step, a command is executed to load this DLL file into an assembly.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174000 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/dllpayload.png\" alt=\"\" width=\"607\" height=\"359\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/dllpayload.png 607w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/dllpayload-300x177.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/dllpayload-205x121.png 205w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 10: DLL obtained from steganography<\/em><\/p>\n<h3><strong>Process Injection into RegAsm.exe<\/strong><\/h3>\n<p>This DLL serves two purposes:<\/p>\n<ol>\n<li>Downloading and decoding the final payload<\/li>\n<li>Injecting it into RegAsm.exe<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174014 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Dll-loaded.png\" alt=\"\" width=\"1171\" height=\"788\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Dll-loaded.png 1171w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Dll-loaded-300x202.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Dll-loaded-1024x689.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Dll-loaded-768x517.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Dll-loaded-192x129.png 192w\" sizes=\"auto, (max-width: 1171px) 100vw, 1171px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 11: DLL loaded<\/em><\/p>\n<p>In Figure 11, at marker 1, a parameter named &#8216;QBXtX&#8217; is utilized to accept an argument for the given instruction. As we proceed with the final stage of the PowerShell command shown in Figure 7, the sequence unfolds as follows:<\/p>\n<p>$arguments = ,(&#8216;txt.46ezabwenrtsac\/42.021.871.591\/\/:ptth&#8217;)<\/p>\n<p>The instruction mandates reversing the content of this parameter and subsequently storing the outcome in the variable named &#8216;address.&#8217; Upon reversing the argument, it transforms into:<\/p>\n<p><em><u>http:\/\/195.178.120.24 \/castrnewbaze64.txt<\/u><\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174028 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/get_request_for_payload.png\" alt=\"\" width=\"972\" height=\"84\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/get_request_for_payload.png 972w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/get_request_for_payload-300x26.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/get_request_for_payload-768x66.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/get_request_for_payload-205x18.png 205w\" sizes=\"auto, (max-width: 972px) 100vw, 972px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 12: Request for payload<\/em><\/p>\n<p>Therefore, it is evident that this DLL is designed to fetch the mentioned text file from the C2 server via the provided URL and save its contents within the variable named &#8220;text.&#8221; This file is 316 KB in size. The data within the file remains in an unreadable or unintelligible format.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174042 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/downloaded-text-file.png\" alt=\"\" width=\"1253\" height=\"617\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/downloaded-text-file.png 1253w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/downloaded-text-file-300x148.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/downloaded-text-file-1024x504.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/downloaded-text-file-768x378.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/downloaded-text-file-205x101.png 205w\" sizes=\"auto, (max-width: 1253px) 100vw, 1253px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 13: Downloaded text file<\/em><\/p>\n<p>In Figure 11, at marker 2, the contents of the &#8220;text&#8221; variable are reversed and overwritten in the same variable. Subsequently, at marker 3, the data stored in the &#8220;text&#8221; variable and is subjected to base64 decoding. Following this, we determined that the file is a .NET compiled executable.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174056 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Final-payload.png\" alt=\"\" width=\"704\" height=\"232\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Final-payload.png 704w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Final-payload-300x99.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Final-payload-205x68.png 205w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 14: Final payload<\/em><\/p>\n<p>In Figure 11, another activity is evident at marker 3, where the process path for the upcoming process injection is specified. The designated process path for the process injection is:<\/p>\n<p><strong><em>&#8220;C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe&#8221;.<\/em><\/strong><\/p>\n<p>Since RegAsm.exe is a legitimate Windows tool, it&#8217;s less likely to raise suspicion from security solutions. Injecting .NET samples into it allows attackers to effectively execute their malicious payload within a trusted context, making detection and analysis more challenging.<\/p>\n<p>Process injection involves using Windows API calls to insert code or a payload into the memory space of a running process. This allows the injected code to execute within the context of the target process. Common steps include allocating memory, writing code, creating a remote thread, and executing the injected code. In this context, the DLL performs a sequence of API calls to achieve process injection:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174070 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/processinjection.png\" alt=\"\" width=\"934\" height=\"899\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/processinjection.png 934w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/processinjection-300x289.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/processinjection-768x739.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/processinjection-134x129.png 134w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/processinjection-24x24.png 24w\" sizes=\"auto, (max-width: 934px) 100vw, 934px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 15: Process Injection<\/em><\/p>\n<p>By obscuring the sequence of API calls and their intended actions through obfuscation techniques, attackers aim to evade detection and make it harder for security researchers to unravel the true behavior of the malicious code. The function \u2018hU0H4qUiSpCA13feW0\u2019 is used for replacing content. For example,<\/p>\n<p>&#8220;kern!&#8221;.Replace(&#8220;!&#8221;, &#8220;el32&#8221;)\u00a0 \u00e0\u00a0 kernel32<\/p>\n<p>Class1.hU0H4qUiSpCA13feW0(&#8220;qllocEx&#8221;, &#8220;q&#8221;, &#8220;VirtualA&#8221;) \u00e0 VirtualAllocEx<\/p>\n<p>As a result, these functions translate into the subsequent API calls:<\/p>\n<ol>\n<li><strong>CreateProcessA : <\/strong>This API call is typically employed to initiate the creation of a new process, rather than for process injection. In the context of process injection, the focus is generally on targeting an existing process and injecting code into it.<\/li>\n<li><strong>VirtualAllocEx<\/strong>: This is often used in process injection to allocate memory within the target process to host the injected code.<\/li>\n<li><strong>ReadProcessMemory<\/strong>: This is used to read the memory of a target process. It is typically used in reflective DLL injection to read the contents of a DLL from the injector&#8217;s memory and write it into the target process.<\/li>\n<li><strong>GetThreadContext<\/strong>: This API is used to retrieve the context (registers, flags, etc.) of a thread within a target process. It&#8217;s useful for modifying thread execution flow during injection.<\/li>\n<li><strong>Wow64GetThreadContext<\/strong>: This is like GetThreadContext, but it&#8217;s used when dealing with 32-bit processes on a 64-bit system.<\/li>\n<li><strong>SetThreadContext<\/strong>: This API is used to set the context of a thread within a target process. This can be useful for modifying the execution flow.<\/li>\n<li><strong>Wow64SetThreadContext<\/strong>: Like SetThreadContext, but for 32-bit processes on a 64-bit system.<\/li>\n<li><strong>ZwUnmapViewOfSection<\/strong>: This is used to unmap a section of a process&#8217;s virtual address space, which could potentially be used to remove a DLL loaded into a target process during injection.<\/li>\n<li><strong>WriteProcessMemory<\/strong>: This is used to write data into the memory of a target process. It&#8217;s commonly used for injecting code or data into a remote process.<\/li>\n<li><strong>ResumeThread<\/strong>: This is used to resume the execution of a suspended thread, often after modifying its context or injecting code.<\/li>\n<\/ol>\n<p>Upon successful injection of the malware into RegAsm.exe, it initiates its intended operations, primarily focused on data theft from the targeted system.<\/p>\n<p>The ultimate executable is heavily obfuscated. It employs an extensive array of switch cases and superfluous code, strategically intended to mislead researchers and complicate analysis. Many of the functions utilize either switch cases or their equivalent constructs, to defend detection. The following snippet of code depicts this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174084 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/obfuscation.png\" alt=\"\" width=\"569\" height=\"735\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/obfuscation.png 569w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/obfuscation-232x300.png 232w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/obfuscation-100x129.png 100w\" sizes=\"auto, (max-width: 569px) 100vw, 569px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 16: Obfuscation<\/em><\/p>\n<h3><strong>Collection of data:<\/strong><\/h3>\n<p><strong>Fingerprinting<\/strong>:<\/p>\n<p>Agent Tesla collects data from compromised devices to achieve two key objectives: firstly, to mark new infections, and secondly, to establish a unique &#8216;fingerprint&#8217; of the victim&#8217;s system. The collected data encompasses:<\/p>\n<ul>\n<li>Computer Name<\/li>\n<li>IP information<\/li>\n<li>Win32_baseboard<\/li>\n<li>Serial number<\/li>\n<li>win32_processor<\/li>\n<li>processorID<\/li>\n<li>Win32_NetworkAdapterConfiguration<\/li>\n<li>MacAddress<\/li>\n<\/ul>\n<h3><strong>Web Browsers:<\/strong><\/h3>\n<p>Agent Tesla initiates the process of gathering data from various web browsers. It utilizes switch cases to handle different browsers, determined by the parameters passed to it. All of these functions are heavily obscured through obfuscation techniques. The following figures depict the browser data that it attempted to retrieve.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174098 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Opera.png\" alt=\"\" width=\"877\" height=\"400\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Opera.png 877w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Opera-300x137.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Opera-768x350.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Opera-205x94.png 205w\" sizes=\"auto, (max-width: 877px) 100vw, 877px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 17: Opera browser<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174112 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/yandex.png\" alt=\"\" width=\"842\" height=\"411\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/yandex.png 842w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/yandex-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/yandex-768x375.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/yandex-205x100.png 205w\" sizes=\"auto, (max-width: 842px) 100vw, 842px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 18: Yandex browser<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174126 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Iridium.png\" alt=\"\" width=\"835\" height=\"411\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Iridium.png 835w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Iridium-300x148.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Iridium-768x378.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Iridium-205x101.png 205w\" sizes=\"auto, (max-width: 835px) 100vw, 835px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 19: Iridium browser<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174140 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Chromium.png\" alt=\"\" width=\"838\" height=\"400\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Chromium.png 838w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Chromium-300x143.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Chromium-768x367.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Chromium-205x98.png 205w\" sizes=\"auto, (max-width: 838px) 100vw, 838px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 20: Chromium browser<\/em><\/p>\n<p>Similarly, it retrieves data from nearly all possible browsers. The captured log below lists all the browsers from which it attempted to retrieve data:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174154 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-1.png\" alt=\"\" width=\"836\" height=\"494\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-1.png 836w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-1-300x177.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-1-768x454.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-1-205x121.png 205w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 21: User data retrieval from all browsers -1<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174168 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-2.png\" alt=\"\" width=\"821\" height=\"457\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-2.png 821w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-2-300x167.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-2-768x427.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/data-from-browser-2-205x114.png 205w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 22: User data retrieval from all browsers \u2013 2<\/em><\/p>\n<h3><strong>Mail Clients:<\/strong><\/h3>\n<p>Agent Tesla is capable of stealing various sensitive data from email clients. This includes email credentials, message content, contact lists, mail server settings, attachments, cookies, auto-complete data, and message drafts. It can target a range of email services to access and exfiltrate this information. Agent Tesla targets the following email clients to gather data:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174182 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/mail-clients.png\" alt=\"\" width=\"1020\" height=\"276\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/mail-clients.png 1020w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/mail-clients-300x81.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/mail-clients-768x208.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/mail-clients-205x55.png 205w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 23: Mail clients<\/em><\/p>\n<h2><strong>Exfiltration:<\/strong><\/h2>\n<p>Agent Tesla employs significant obfuscation techniques to evade initial static analysis attempts. This strategy conceals its malicious code and actual objectives. Upon successful decoding, we were able to scrutinize its internal operations and functionalities, including the use of SMTP for data exfiltration.<\/p>\n<p>The observed sample utilizes SMTP as its chosen method of exfiltration. This protocol is frequently favored due to its minimal overhead demands on the attacker. SMTP reduces overhead for attackers because it is efficient, widely allowed in networks, uses existing infrastructure, causes minimal anomalies, leverages compromised accounts, and appears less suspicious compared to other protocols. A single compromised email account can be used for exfiltration, streamlining the process, and minimizing the need for complex setups. They can achieve their malicious goals with just a single email account, simplifying their operations.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174196 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Function-calls-made-for-exfiltration.-1024x615.png\" alt=\"\" width=\"1024\" height=\"615\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Function-calls-made-for-exfiltration.-1024x615.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Function-calls-made-for-exfiltration.-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Function-calls-made-for-exfiltration.-768x462.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Function-calls-made-for-exfiltration.-205x123.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Function-calls-made-for-exfiltration..png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 24: Function calls made for exfiltration.<\/em><\/p>\n<p>This is the procedure by which functions are invoked to facilitate data extraction via SMTP:<\/p>\n<ol>\n<li>A specific value is provided as a parameter, and this value is processed within the functions. As a result, it ultimately determines the port number to be utilized for SMTP communication. In this case, port number 587 is used for communication.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174210 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/port-number.png\" alt=\"\" width=\"683\" height=\"415\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/port-number.png 683w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/port-number-300x182.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/port-number-205x125.png 205w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 25: Port number<\/em><\/p>\n<ol start=\"2\">\n<li>Next, the malware retrieves the hostname of the email address it intends to utilize i.e., corpsa.net.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174224 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa-domain-retrieval.png\" alt=\"\" width=\"766\" height=\"390\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa-domain-retrieval.png 766w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa-domain-retrieval-300x153.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa-domain-retrieval-205x104.png 205w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 26: Domain retrieval<\/em><\/p>\n<ol start=\"3\">\n<li>Subsequently, the email address through which communication is intended to occur is revealed.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174238 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_email.png\" alt=\"\" width=\"769\" height=\"374\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_email.png 769w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_email-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_email-205x100.png 205w\" sizes=\"auto, (max-width: 769px) 100vw, 769px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 27: Email address used<\/em><\/p>\n<ol start=\"4\">\n<li>Lastly, the password for that email address is provided, so that attacker can log in and can start sending out the data.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174252 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_password.png\" alt=\"\" width=\"716\" height=\"498\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_password.png 716w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_password-300x209.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/corpsa_password-185x129.png 185w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 28: Password<\/em><\/p>\n<p>The SMTP process as outlined involves a series of systematic steps. It begins with the processing of a specific parameter value, which subsequently determines the port number for SMTP communication. Following this, the malware retrieves the associated domain of the intended email address, revealing the address itself and ultimately providing the corresponding password. This orchestrated sequence highlights how the malware establishes a connection through SMTP, facilitating its intended operations.<\/p>\n<p>Following these steps, the malware efficiently establishes a login using acquired credentials. Once authenticated, it commences the process of transmitting the harvested data to a designated email address associated with the malware itself.<\/p>\n<h3><strong>Summary<\/strong><strong>:<\/strong><\/h3>\n<p>The infection process of Agent Tesla involves multiple stages. It begins with the initial vector, often using email attachments or other social engineering tactics. Once executed, the malware employs obfuscation to avoid detection during static analysis. The malware then undergoes decoding, revealing its true functionality. It orchestrates a sequence of PowerShell commands to download and process a hidden image containing encoded instructions. These instructions lead to the extraction of a .NET DLL file, which subsequently injects the final payload into the legitimate process &#8216;RegAsm.exe&#8217; using a series of API calls for process injection. This payload carries out its purpose of data theft, including targeting browsers and email clients for sensitive information. The stolen data is exfiltrated via SMTP communication, providing stealth and leveraging email accounts. Overall, Agent Tesla&#8217;s infection process employs a complex chain of techniques to achieve its data-stealing objectives.<\/p>\n<h3><strong>Indicators of compromise (IoC):<\/strong><\/h3>\n<table>\n<tbody>\n<tr>\n<td width=\"75\"><strong>File<\/strong><\/td>\n<td width=\"174\"><strong>MD5<\/strong><\/td>\n<td width=\"374\"><strong>SHA256<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>VBS file<\/strong><\/td>\n<td width=\"174\">e2a4a40fe8c8823ed5a73cdc9a8fa9b9<\/td>\n<td width=\"374\">e7a157ba1819d7af9a5f66aa9e161cce68d20792d117a90332ff797cbbd8aaa5<\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>JPEG file<\/strong><\/td>\n<td width=\"174\">ec8dfde2126a937a65454323418e28da<\/td>\n<td width=\"374\">21c5d3ef06d8cff43816a10a37ba1804a764b7b31fe1eb3b82c144515297875f<\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>DLL file<\/strong><\/td>\n<td width=\"174\">b257f83495996b9a79d174d60dc02caa<\/td>\n<td width=\"374\">b2d667caa6f3deec506e27a5f40971cb344b6edcfe6182002f1e91ce9167327f<\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>Final payload<\/strong><\/td>\n<td width=\"174\">dd94daef4081f63cf4751c3689045213<\/td>\n<td width=\"374\">abe5c5bb02865ac405e08438642fcd0d38abd949a18341fc79d2e8715f0f6e42<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Table 1:Indicators of Compromise<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the&#8230;<\/p>\n","protected":false},"author":695,"featured_media":174285,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-173859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Agent Tesla&#039;s Unique Approach: VBS and Steganography for Delivery and Intrusion | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agent Tesla&#039;s Unique Approach: VBS and Steganography for Delivery and Intrusion | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-08T15:47:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-15T16:25:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Agent Tesla&#8217;s Unique Approach: VBS and Steganography for Delivery and Intrusion\",\"datePublished\":\"2023-09-08T15:47:49+00:00\",\"dateModified\":\"2023-09-15T16:25:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/\"},\"wordCount\":2177,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/\",\"name\":\"Agent Tesla's Unique Approach: VBS and Steganography for Delivery and Intrusion | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png\",\"datePublished\":\"2023-09-08T15:47:49+00:00\",\"dateModified\":\"2023-09-15T16:25:40+00:00\",\"description\":\"Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Agent Tesla&#8217;s Unique Approach: VBS and Steganography for Delivery and Intrusion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agent Tesla's Unique Approach: VBS and Steganography for Delivery and Intrusion | McAfee Blog","description":"Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Agent Tesla's Unique Approach: VBS and Steganography for Delivery and Intrusion | McAfee Blog","og_description":"Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable of","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-09-08T15:47:49+00:00","article_modified_time":"2023-09-15T16:25:40+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Agent Tesla&#8217;s Unique Approach: VBS and Steganography for Delivery and Intrusion","datePublished":"2023-09-08T15:47:49+00:00","dateModified":"2023-09-15T16:25:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/"},"wordCount":2177,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/","name":"Agent Tesla's Unique Approach: VBS and Steganography for Delivery and Intrusion | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png","datePublished":"2023-09-08T15:47:49+00:00","dateModified":"2023-09-15T16:25:40+00:00","description":"Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_Agent-Tesla-1.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Agent Tesla&#8217;s Unique Approach: VBS and Steganography for Delivery and Intrusion"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=173859"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173859\/revisions"}],"predecessor-version":[{"id":174313,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173859\/revisions\/174313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/174285"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=173859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=173859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=173859"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=173859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}