Agent Tesla - Daily Threat Report

Saturday, April 18, 2026

Daily Summary

Agent Tesla activity declined today, with 16 new samples identified against a 7-day average of 21, representing a 23% decrease. No new C2 infrastructure was registered, indicating a potential lull in new campaign deployments or a shift in operational tempo.

New Samples Detected

JavaScript (.js) files dominated today’s submissions, accounting for 9 of the 16 samples. This continues a recent pattern favoring script-based initial access. The remaining samples include .exe, .vbs, and one instance each of .uu (a Uuencoded file) and .hta, suggesting attackers are testing less common file types to bypass simple filters.

Distribution Methods

The prevalence of .js and .vbs files points to ongoing phishing campaigns delivering malicious scripts via email attachments or links. The single .hta file aligns with HTML Application abuse, often delivered through phishing or malicious ads. The .uu file may indicate an attempt to obfuscate a payload within a text file to evade detection.

Detection Rate

Current variants show a moderate detection rate by aggregate AV engines. The consistent use of script-based payloads (.js, .vbs) often achieves lower initial detection scores than executable files, providing a brief window for execution before detection signatures are updated.

C2 Infrastructure

No new C2 servers were identified today. This absence, coupled with the lower sample volume, may suggest infrastructure consolidation or a pause between campaigns. Existing infrastructure remains active, with no significant geographic shifts noted.

7-Day Trend

Today’s decline follows a period of relatively steady activity near the 21-sample average earlier in the week. This drop could represent normal fluctuation or a temporary reduction in distribution efforts.

Security Analysis

The appearance of a .uu file is a minor but notable shift in obfuscation tactics for this family. While Agent Tesla’s core functionality remains consistent, its packagers are experimenting with encoding schemes less common than base64. This aligns with a broader trend of using legacy or niche file formats to bypass defensive rules tuned for more prevalent types. A key defensive recommendation is to enhance email filtering and endpoint logging to flag and inspect files with unusual extensions like .uu, especially when arriving from external sources, even if they appear to be plain text.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)