overall verdicts of automated systems are pretty much useless. They do not know the context/purpose of any program and are frequently mistaken.
Couldn't agree more as for example one of the automated services that's seen/added in the
community tab on VT in this case, is even mention Kasperskys service as reference for it's " Malicious " verdict. The sad/funny part is that Kaspersky flag it as green/clean. Automated services or sandbox platforms is a good initial tool, but as I mentioned it requires more
investigation to get a better more conclusive assessment.
Hopefully as a small help. Active and alive real AgentTesla samples acts different and specific on how they connect out and send it's collected/stolen credential.
send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S)...
malpedia.caad.fkie.fraunhofer.de
Btw, here's Kasperskys analysts latest verdict: