ago.exe
ago.exe
216KB
22-11-2020 00:07
8a22b57fee81a6691ba74ce13ea58f95
e53b9783088fda62bcd087478eee6658097858c0
c0854444ad8bd79257dd667fb86b4e395921c709bc00a1e43691219339a546d1
Filter: none
-
Reads data files stored by FTP clients
Description
Tries to access configuration files associated with programs like FileZilla.
Tags
TTPs
-
Reads user/profile data of local email clients
Description
Email clients store some user data on disk where infostealers will often target it.
Tags
TTPs
-
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Looks up external IP address via web service
Description
Uses a legitimate IP lookup service to find the infected system's external IP.
Reported IOCs
flow ioc 15 api.ipify.org 16 api.ipify.org -
Suspicious behavior: EnumeratesProcessesago.exe
Reported IOCs
pid process 424 ago.exe 424 ago.exe -
Suspicious use of AdjustPrivilegeTokenago.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 424 ago.exe
-
C:\Users\Admin\AppData\Local\Temp\ago.exe"C:\Users\Admin\AppData\Local\Temp\ago.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
Download
memory/424-0-0x0000000073D50000-0x000000007443E000-memory.dmp
-
Download
memory/424-1-0x0000000000920000-0x0000000000921000-memory.dmp
-
Download
memory/424-3-0x0000000005770000-0x0000000005771000-memory.dmp
-
Download
memory/424-4-0x0000000005310000-0x0000000005311000-memory.dmp
-
Download
memory/424-5-0x00000000056B0000-0x00000000056B1000-memory.dmp
-
Download
memory/424-6-0x0000000005E60000-0x0000000005E61000-memory.dmp
-
Download
memory/424-7-0x00000000069D0000-0x00000000069D1000-memory.dmp
-
Download
memory/424-8-0x00000000010C0000-0x00000000010C1000-memory.dmp