This lab walkthrough focuses on analyzing a malicious executable, identified as part of the Agent Tesla malware family. The lab explores various aspects of malware analysis, such as unpacking obfuscated binaries, identifying embedded scripting engines, evaluating exfiltration mechanisms, and examining anti-VM techniques. By leveraging tools like Detect It Easy (DIE), UPX, dnSpy, Process Monitor ProcMon, and AutoIt Extractor, we dissect the functionality of the malware to understand its capabilities and persistence mechanisms.
Agent Tesla is a sophisticated malware strain widely known for its information-stealing capabilities, such as keylogging, screen capturing, and data exfiltration. It uses various evasion techniques, including obfuscation, anti-VM detection, and abuse of legitimate services for exfiltration. The lab emphasizes critical malware analysis workflows, including unpacking the binary, identifying its components, analyzing its behavior, and extracting meaningful indicators of compromise (IOCs).
Participants in this lab will gain hands-on experience in:
AutoIt embedded in the malware to decode its functionality.