Agent Tesla - Daily Threat Report

Monday, April 20, 2026

Daily Summary

Agent Tesla activity shows a significant decline today, with only 7 new samples detected. This represents a 69% drop from the 7-day average of 23 samples. The absence of new C2 servers suggests a potential lull in infrastructure deployment or a shift in operational tempo.

New Samples Detected

The new samples are split between executable (.exe) and JavaScript (.js) files, with three of each. The single .infected file is atypical and may indicate a failed or intercepted payload in transit. The equal split between .exe and .js points to a continued dual approach in initial infection vectors.

Distribution Methods

The file types indicate ongoing use of phishing emails with malicious JavaScript attachments or links, a common delivery vector for this stealer. The .exe files likely represent compiled payloads, possibly distributed via malicious downloads or bundled with other software. No significant shift from established email-based social engineering campaigns is evident in today’s data.

Detection Rate

Current variants remain well-detected by major antivirus vendors, with a high consensus rate for the submitted samples. The consistent use of known scripting and packing methods offers few new evasion techniques in this batch, suggesting these may be reconfigurations of existing code rather than novel builds.

C2 Infrastructure

No new command-and-control servers were identified today. This aligns with the low sample volume and may indicate the actors are utilizing existing, resilient infrastructure. Monitoring of previously identified C2 IPs and domains should continue, as they likely remain active.

7-Day Trend

Today’s low count continues a cooling trend observed over the past several days, following a period of higher volume earlier in the week. Activity appears to be returning to a lower baseline after a surge.

Security Analysis

The persistence of JavaScript loaders alongside executables indicates actors are maintaining flexibility to bypass environment-specific defenses. A notable, though subtle, shift is the use of the .infected extension, which could be an attempt to masquerade as a quarantined file or to exploit improper file-type handling in some systems. Defensive teams should enhance email filtering rules to flag .js files and scrutinize any file with an .infected extension, as it is an unusual final payload format and warrants immediate isolation.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More Agent Tesla Reports

Recent Malware Reports