Alias Description | Votes |
---|---|
Dcrat is a possible alias for Agenttesla. DcRAT is a malicious software (malware) known as a Remote Access Trojan (RAT), which has been utilized in a widespread campaign to exploit computer systems. The malware infiltrates systems through deceptive methods, including downloads from fake Google Meet and OnlyFans sites. When a user interacts | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Lokibot Malware is associated with Agenttesla. LokiBot is a malicious software, or malware, that was first reported on October 24, 2020. It is designed to exploit and damage computer systems by infiltrating them through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, LokiBot steals personal information | Unspecified | 6 |
The njRAT Malware is associated with Agenttesla. NjRAT is a remote-access Trojan (RAT) that has been in use since 2013, often deployed in both criminal and targeted attacks. This malware can infiltrate systems via suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside a system, NjRAT can steal personal information, d | Unspecified | 5 |
The Redline Malware is associated with Agenttesla. RedLine is a type of malware, a malicious software designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, RedLine can steal personal information, disrupt operations, or deliver further | Unspecified | 5 |
The Xworm Malware is associated with Agenttesla. XWorm is a multifaceted malware that has been used by threat actors to exploit vulnerabilities in systems running the ScreenConnect client software. The malicious software, first reported in 2023, provides remote access capabilities, has the potential to spread across networks, and can exfiltrate se | Unspecified | 4 |
The Formbook Malware is associated with Agenttesla. Formbook is a type of malware, malicious software designed to exploit and damage computer systems. It infects systems through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for ransom. Formbook has been linked with other forms o | Unspecified | 3 |
The NanoCore Malware is associated with Agenttesla. NanoCore is a notorious Remote Access Trojan (RAT) first discovered in 2013. It targets Windows operating system users and operates by opening a backdoor on an infected computer to steal information. NanoCore has maintained a top five position for six consecutive months, taking the third spot in Dec | Unspecified | 2 |
The Raccoon Malware is associated with Agenttesla. Raccoon, also known as Racealer, is a potent malware-as-a-service (MaaS) info stealer that was first detected in 2019. Utilized by Scattered Spider threat actors, this malware is used to obtain sensitive information such as login credentials, browser cookies, and browsing histories from victims' sys | Unspecified | 2 |
The NETWIRE Malware is associated with Agenttesla. NetWire is a type of malware, specifically a remote access trojan (RAT), that has been utilized for various malicious activities since at least 2014. Initially promoted as a legitimate tool for managing Windows computers remotely, NetWire was quickly adopted by cybercriminals and used in phishing at | Unspecified | 2 |
The DarkComet Malware is associated with Agenttesla. DarkComet is a Remote Access Trojan (RAT) that opens a backdoor on infected computers, allowing unauthorized access and data theft. This malware has been classified among the top five Command and Control (C2) families, indicating its widespread usage by cybercriminals. DarkComet, along with other es | Unspecified | 2 |
The AsyncRAT Malware is associated with Agenttesla. AsyncRAT is a type of malware, malicious software designed to exploit and damage computer systems. It infects systems through dubious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for ransom. This freely available infostealer can record v | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Checkpoint | 4 months ago | ||
SANS ISC | 6 months ago | ||
BankInfoSecurity | 6 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
InfoSecurity-magazine | 8 months ago | ||
Fortinet | 8 months ago | ||
CERT-EU | 9 months ago | ||
Secureworks | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 10 months ago | ||
MITRE | 10 months ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
Checkpoint | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago |