AA_v3.exe
First submission 2024-10-16 17:52:02
Last sumbission 2024-10-16 21:01:03
File details
File type: | PE32 executable (GUI) Intel 80386, for MS Windows |
Mime type: | application/x-dosexec |
File size: | 778.14 KB (796816 bytes) |
Compile time: | 2019-03-12 13:30:53 |
MD5: | 121e1634bf18768802427f0a13f039a9 |
SHA1: | 8868654ba10fb4c9a7bd882d1f947f4fd51e988e |
SHA256: | 5fc600351bade74c2791fc526bca6bb606355cc65e5253f7f791254db58ee7fa |
Import Hash : | f97ad1acd1ab75d2d973b655b2e7f9b9 |
Sections 4 | .text .rdata .data .rsrc |
Directories 3 | import resource security |
File features detected
XOR
OSINT Enrichments
Virus Total: | 46/76 VT report date: 2024-10-07 11:27:26 |
Malware Type 3 | hacktool trojan pua |
Threat Type 3 | ammyy ammyyadmin remadm |
URLs, FQDN and IP indicators 3
PE Sections 0 suspicious
Name | VAddress | VSize | Size | SHA1 | MD5 | Suspicious |
---|---|---|---|---|---|---|
.text | 0x1000 | 0x86a32 | 552960 | e7068f4d4bce7c8e987241dbf8d46e3d61510536 | 0db24e9b0c6f51170a412c53204fac3e | |
.rdata | 0x88000 | 0x194de | 106496 | 752fcf9652884f90b2ded8fd2fb705b4f68181ab | 520f1df03a494e1d1269f9d61094eb7d | |
.data | 0xa2000 | 0x1ad98 | 81920 | 5654dbe20e014cdb0caf009a10dca6d203796067 | 3104ea65674f21bb80a192051e8bb694 | |
.rsrc | 0xbd000 | 0xa658 | 45056 | 3516ed2e2424b22fcac5e14d7ea17c4cbc3d058a | 3b59cf0be0893b2684a4668ab90605c4 |
PE Resources 11
Name | Language | Sublanguage | Offset | Size | Data |
---|---|---|---|---|---|
BINARY | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xc38d0 | 1 | |
RT_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xc5078 | 308 | |
RT_BITMAP | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xc4648 | 1194 | |
RT_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xc27f8 | 4264 | |
RT_MENU | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbda00 | 250 | |
RT_DIALOG | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbf870 | 156 | |
RT_GROUP_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xc51b0 | 20 | |
RT_GROUP_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xc38a0 | 48 | |
RT_VERSION | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xc4af8 | 736 | |
RT_MANIFEST | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbf920 | 1474 | |
None | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbf910 | 11 |
Meta infos 13
LegalCopyright: | |
InternalName: | Ammyy Admin |
FileVersion: | 3.9 |
FileDescription: | Ammyy Admin |
SpecialBuild: | |
CompanyName: | Ammyy LLC |
LegalTrademarks: | |
Comments: | |
ProductName: | Ammyy Admin |
ProductVersion: | 3.9 |
PrivateBuild: | |
Translation: | 0x0409 0x04b0 |
OriginalFilename: |
Packers detected 3
Microsoft Visual C++ v6.0 |
Microsoft Visual C++ 5.0 |
Microsoft Visual C++ |
Anti debug functions 7
FindWindowA |
FindWindowW |
GetLastError |
GetWindowThreadProcessId |
Process32First |
Process32Next |
TerminateProcess |
Anti debug functions 1
VMCheck.dll |
File signature
MD5 | SHA1 | Block size | Virtual Address |
---|---|---|---|
dd11697fa70b6d905222899ef76c4249 | 35076570190643354d1a34308ad1e24e26d3e3fd | 6288 | 790528 |
Strings analysis - File found
Binary |
Ammyy_Contact_Book.bin |
*.bin |
contacts3.bin |
_tmp\AMMYY_Admin.bin |
settings3.bin |
settings.bin |
contacts.bin |
sessions.bin |
Log |
eAMMYY_service.log |
ammyy.log |
ammyy_id.log |
Temporary |
%sAmmyy_%X.tmp |
Object |
hhctrl.ocx |
Data |
%u-%u-%u-%u.dat |
Library |
W\winsta.dll |
Shcore.dll |
ewmsgapi.dll |
ADVAPI32.dll |
SHLWAPI.dll |
dwmapi.dll |
WININET.dll |
WTSAPI32.dll |
MSVCRT.dll |
SHELL32.dll |
WS2_32.dll |
COMCTL32.dll |
secur32.dll |
USER32.dll |
USERENV.dll |
SETUPAPI.dll |
GDI32.dll |
KERNEL32.dll |
DSOUND.dll |
COMDLG32.dll |
IPHLPAPI.DLL |
Strings analysis - Possible IPs found 2
1.0.0.1 |
127.0.0.1 |
Strings analysis - Possible URLs found 16
http://www.ammyy.com/?lang= |
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
http://ts-ocsp.ws.symantec.com07 |
http://ocsp.comodoca.com0 |
http://crl.thawte.com/ThawteTimestampingCA.crl0 |
https://secure.comodo.net/CPS0C |
http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$ |
http://ocsp.thawte.com0 |
http://www.ammyy.com/ |
http://www.ammyy.com |
http://schemas.microsoft.com/SMI/2005/WindowsSettings |
http://rl.ammyy.com |
http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$ |
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0< |