assistenza.exe

First submission 2024-10-16 17:55:03 Last sumbission 2024-10-18 06:38:02

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 755.49 KB (773624 bytes)
Compile time: 2015-05-29 12:36:12
MD5: 11bc606269a161555431bacf37f7c1e4
SHA1: 63c52b0ac68ab7464e2cd777442a5807db9b5383
SHA256: 1831806fc27d496f0f9dcfd8402724189deaeb5f8bcf0118f3d6484d0bdee9ed
Import Hash : 3a8eb283f62eca7206b65c62b7d51bd5
Sections 4 .text .rdata .data .rsrc
Directories 3 import resource security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 54/77 VT report date: 2024-10-16 14:16:27
Malware Type 3 hacktool pua trojan
Threat Type 3 ammyy ammyyadmin ammyyadmn

URLs, FQDN and IP indicators 6

URL Host (FQDN/IP) Date Added
hXXp://www.spaziotempo.info/assistenza.exe VirusTotal Report www.spaziotempo.info VirusTotal Report 2024-10-18 06:38:07
hXXp://topsoft.info/downloads/suporteremoto/ammy.exe VirusTotal Report topsoft.info VirusTotal Report 2024-10-18 06:17:09
hXXp://www.bclick.com.br/download/AA_v3.exe VirusTotal Report www.bclick.com.br VirusTotal Report 2024-10-16 18:16:10
hXXp://www.scs-anapa.ru/soft/aa_v3.exe?t=20160608 VirusTotal Report www.scs-anapa.ru VirusTotal Report 2024-10-16 18:12:07
hXXp://monastery.mlnk.net/programs/AA_v3.5.exe VirusTotal Report monastery.mlnk.net VirusTotal Report 2024-10-16 17:58:07
hXXp://gdent.bg/files/AA_v3.exe VirusTotal Report gdent.bg VirusTotal Report 2024-10-16 17:55:03

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x81faa 532480 3e59ddbedd9b533d6a8d9862cb310d5b92a384ed 18f21f4bf8c8043c6d676796d512243f
.rdata 0x83000 0x185b6 102400 6d9fd015d79ca29588f3b35415d92580a882ff06 6bbf88e0cd6467daec2d2b231584f8da
.data 0x9c000 0x1ad40 81920 0127f7a2808405b476254124c8b2df88d0d205b0 eddb86cbb4b45a1e2c497057bcaf21a4
.rsrc 0xb7000 0xa178 45056 980fbe224578bcfba1451607babb4fd83b19d5b0 d5bdf46d0655070c33aa072689764704

PE Resources 11

Name Language Sublanguage Offset Size Data
BINARY LANG_NEUTRAL SUBLANG_NEUTRAL 0xbd3f0 1
RT_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xbeb98 308
RT_BITMAP LANG_NEUTRAL SUBLANG_NEUTRAL 0xbe168 1194
RT_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbc318 4264
RT_MENU LANG_NEUTRAL SUBLANG_NEUTRAL 0xb79d0 250
RT_DIALOG LANG_NEUTRAL SUBLANG_NEUTRAL 0xb92f8 784
RT_GROUP_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xbecd0 20
RT_GROUP_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbd3c0 48
RT_VERSION LANG_ENGLISH SUBLANG_ENGLISH_US 0xbe618 736
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0xb9788 637
None LANG_NEUTRAL SUBLANG_NEUTRAL 0xb9778 11

Meta infos 13

LegalCopyright:
InternalName: Ammyy Admin
FileVersion: 3.5
FileDescription: Ammyy Admin
SpecialBuild:
CompanyName: Ammyy LLC
LegalTrademarks:
Comments:
ProductName: Ammyy Admin
ProductVersion: 3.5
PrivateBuild:
Translation: 0x0409 0x04b0
OriginalFilename:

Packers detected 3

Microsoft Visual C++ v6.0
Microsoft Visual C++ 5.0
Microsoft Visual C++

Anti debug functions 7

FindWindowA
FindWindowW
GetLastError
GetWindowThreadProcessId
Process32First
Process32Next
TerminateProcess

Anti debug functions 1

VMCheck.dll

File signature

MD5 SHA1 Block size Virtual Address
fc55c53aa9035d564da3abc17f29c074 9043321f2ca541e0596971886d65c813f97373f1 7672 765952

Strings analysis - File found

Binary
Ammyy_Contact_Book.bin
*.bin
contacts3.bin
_tmp\AMMYY_Admin.bin
settings3.bin
settings.bin
contacts.bin
sessions.bin
Log
eAMMYY_service.log
ammyy.log
ammyy_id.log
Temporary
%sAmmyy_%X.tmp
Object
hhctrl.ocx
Library
W\winsta.dll
ewmsgapi.dll
ADVAPI32.dll
SHLWAPI.dll
dwmapi.dll
WTSAPI32.dll
MSVCRT.dll
USER32.dll
SHELL32.dll
WS2_32.dll
COMCTL32.dll
secur32.dll
WININET.dll
USERENV.dll
SETUPAPI.dll
GDI32.dll
KERNEL32.dll
DSOUND.dll
COMDLG32.dll
IPHLPAPI.DLL
msvcp60.dll

Strings analysis - Possible IPs found 2

1.0.0.1
127.0.0.1

Strings analysis - Possible URLs found 17

http://www.ammyy.com/?lang=
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
http://ts-ocsp.ws.symantec.com07
http://ocsp.comodoca.com0
http://crl.thawte.com/ThawteTimestampingCA.crl0
https://secure.comodo.net/CPS0C
http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
http://crl.usertrust.com/AddTrustExternalCARoot.crl05
http://ocsp.thawte.com0
http://www.ammyy.com/
http://ocsp.usertrust.com0
http://www.ammyy.com
http://rl.ammyy.com
http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<

Import functions

Name Latest seen MD5
Ammyy.exe 2024-10-18 06:36:02 3b4ed97de29af222837095a7c411b8a1