2026-02-03 (Tuesday): #GuLoader for #AgentTesla style malware with FTP data exfiltration.
A #pcap of the infection traffic, associated files, and a list of indicators are available at https://www.malware-traffic-analysis.net/2026/02/03/index.html
Two online sandboxes tag this sample as AgentTesla, but I'm not sure what the actual name of this malware is.
- https://tria.ge/260203-tvhlyahx7c
- https://app.any.run/tasks/0840196f-2b8f-415c-8ca7-af0c8f394b0d


















![HTTP stream of the last HTTP traffic in the pcap, showing a POST request that retrieves malicious content from a server at 91.92.241[.]10.](https://files.mastodon.social/cache/media_attachments/files/115/877/592/945/741/050/small/c62f4a555b9a526b.jpg)
![Using the wget command to retrieve one of the malicious files from the server at 91.92.241[.]10 on Sunday, 2026-01-11.](https://files.mastodon.social/cache/media_attachments/files/115/877/592/974/617/072/small/4b21278586caf04c.jpg)
![Example of a shell script downloaded from 91.92.241[.]10 on Sunday, 2026-01-11, likely for Mirai botnet malware.](https://files.mastodon.social/cache/media_attachments/files/115/877/593/003/106/259/small/ba2b1654e7de8917.jpg)
















![Fake CAPTCHA page from KongTuke domain, scrroeder[.]com.](https://files.mastodon.social/cache/media_attachments/files/115/843/530/765/919/436/small/8e84b869c4b02a6e.jpg)





