

It has been observed dropping from weaponized documents that download the malware. Malicious attachments in phishing emails are the most common deployment method for Agent Tesla.

This spyware is easy to get and easy to customize which makes it very popular. Agent Tesla is most commonly delivered via phishing campaigns and is sold and distributed across a number of hacking forums and platforms for anyone to purchase and use. This information can then be traded or used for business intelligence or ransom. It is used to steal sensitive information from a victim’s device such as user credentials, keystrokes, clipboard data, credentials from browsers, and other information.

NET framework that has been observed since 2014 with many iterations since then. Agent Tesla is an extremely popular spyware Trojan written for the.
