yara/rules/Windows_Trojan_AgentTesla.yar (144 lines of code) (raw):

rule Windows_Trojan_AgentTesla_d3ac2b2f { meta: author = "Elastic Security" id = "d3ac2b2f-14fc-4851-8a57-41032e386aeb" fingerprint = "cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc" creation_date = "2021-03-22" last_modified = "2022-06-20" threat_name = "Windows.Trojan.AgentTesla" reference = "https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla" reference_sample = "65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "GetMozillaFromLogins" ascii fullword $a2 = "AccountConfiguration+username" wide fullword $a3 = "MailAccountConfiguration" ascii fullword $a4 = "KillTorProcess" ascii fullword $a5 = "SmtpAccountConfiguration" ascii fullword $a6 = "GetMozillaFromSQLite" ascii fullword $a7 = "Proxy-Agent: HToS5x" wide fullword $a8 = "set_BindingAccountConfiguration" ascii fullword $a9 = "doUsernamePasswordAuth" ascii fullword $a10 = "SafariDecryptor" ascii fullword $a11 = "get_securityProfile" ascii fullword $a12 = "get_useSeparateFolderTree" ascii fullword $a13 = "get_DnsResolver" ascii fullword $a14 = "get_archivingScope" ascii fullword $a15 = "get_providerName" ascii fullword $a16 = "get_ClipboardHook" ascii fullword $a17 = "get_priority" ascii fullword $a18 = "get_advancedParameters" ascii fullword $a19 = "get_disabledByRestriction" ascii fullword $a20 = "get_LastAccessed" ascii fullword $a21 = "get_avatarType" ascii fullword $a22 = "get_signaturePresets" ascii fullword $a23 = "get_enableLog" ascii fullword $a24 = "TelegramLog" ascii fullword $a25 = "generateKeyV75" ascii fullword $a26 = "set_accountName" ascii fullword $a27 = "set_InternalServerPort" ascii fullword $a28 = "set_bindingConfigurationUID" ascii fullword $a29 = "set_IdnAddress" ascii fullword $a30 = "set_GuidMasterKey" ascii fullword $a31 = "set_username" ascii fullword $a32 = "set_version" ascii fullword $a33 = "get_Clipboard" ascii fullword $a34 = "get_Keyboard" ascii fullword $a35 = "get_ShiftKeyDown" ascii fullword $a36 = "get_AltKeyDown" ascii fullword $a37 = "get_Password" ascii fullword $a38 = "get_PasswordHash" ascii fullword $a39 = "get_DefaultCredentials" ascii fullword condition: 8 of ($a*) } rule Windows_Trojan_AgentTesla_e577e17e { meta: author = "Elastic Security" id = "e577e17e-5c42-4431-8c2d-0c1153128226" fingerprint = "009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d" creation_date = "2022-03-11" last_modified = "2022-04-12" threat_name = "Windows.Trojan.AgentTesla" reference = "https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla" reference_sample = "ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a = { 20 4D 27 00 00 33 DB 19 0B 00 07 17 FE 01 2C 02 18 0B 00 07 } condition: all of them } rule Windows_Trojan_AgentTesla_f2a90d14 { meta: author = "Elastic Security" id = "f2a90d14-7212-41a5-a2cd-a6a6dedce96e" fingerprint = "829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6" creation_date = "2022-03-11" last_modified = "2022-04-12" threat_name = "Windows.Trojan.AgentTesla" reference = "https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla" reference_sample = "ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a = { 0B FE 01 2C 0B 07 16 7E 08 00 00 04 A2 1F 0C 0C 00 08 1F 09 FE 01 } condition: all of them } rule Windows_Trojan_AgentTesla_a2d69e48 { meta: author = "Elastic Security" id = "a2d69e48-b114-4128-8c2f-6fabee49e152" fingerprint = "bd46dd911aadf8691516a77f3f4f040e6790f36647b5293050ecb8c25da31729" creation_date = "2023-05-01" last_modified = "2023-06-13" threat_name = "Windows.Trojan.AgentTesla" reference = "https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla" reference_sample = "edef51e59d10993155104d90fcd80175daa5ade63fec260e3272f17b237a6f44" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = { 00 03 08 08 10 08 10 18 09 00 04 08 18 08 10 08 10 18 0E 00 08 } $a2 = { 00 06 17 5F 16 FE 01 16 FE 01 2A 00 03 30 03 00 B1 00 00 00 } condition: all of them } rule Windows_Trojan_AgentTesla_ebf431a8 { meta: author = "Elastic Security" id = "ebf431a8-45e8-416c-a355-4ac1db2d133a" fingerprint = "2d95dbe502421d862eee33ba819b41cb39cf77a44289f4de4a506cad22f3fddb" creation_date = "2023-12-01" last_modified = "2024-01-12" threat_name = "Windows.Trojan.AgentTesla" reference = "https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla" reference_sample = "0cb3051a80a0515ce715b71fdf64abebfb8c71b9814903cb9abcf16c0403f62b" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "MozillaBrowserList" $a2 = "EnableScreenLogger" $a3 = "VaultGetItem_WIN7" $a4 = "PublicIpAddressGrab" $a5 = "EnableTorPanel" $a6 = "get_GuidMasterKey" condition: 4 of them }