Pasta.7z
: The user runs the internal file, which often uses a "double extension" (e.g., invoice_copy.pdf.exe ) to appear harmless. Capabilities :
: The user receives an email with a subject like "Payment Advice" or "Shipping Documents." Extraction : The user extracts "Pasta.7z." Pasta.7z
: Scrapes passwords from web browsers, FTP clients, and email platforms. : The user runs the internal file, which
: The .7z format is chosen for its ability to hide malicious code from signature-based detection. The archive usually contains a single executable ( .exe ) or a heavily obfuscated JavaScript/VBScript loader. The archive usually contains a single executable (
: Configure email gateways to quarantine or block high-risk compressed formats like .7z , .rar , and .iso from unknown external senders.
: Most frequently associated with Agent Tesla . This is a .NET-based Remote Access Trojan (RAT) that functions as a keylogger and data stealer. Infection Vector :
: Sends stolen data back to the attacker via SMTP, FTP, or Telegram API. Indicators of Compromise (IoCs)