AA_v3.exe

First submission 2024-10-16 17:52:02 Last sumbission 2024-10-16 21:01:03

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 778.14 KB (796816 bytes)
Compile time: 2019-03-12 13:30:53
MD5: 121e1634bf18768802427f0a13f039a9
SHA1: 8868654ba10fb4c9a7bd882d1f947f4fd51e988e
SHA256: 5fc600351bade74c2791fc526bca6bb606355cc65e5253f7f791254db58ee7fa
Import Hash : f97ad1acd1ab75d2d973b655b2e7f9b9
Sections 4 .text .rdata .data .rsrc
Directories 3 import resource security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 46/76 VT report date: 2024-10-07 11:27:26
Malware Type 3 hacktool trojan pua
Threat Type 3 ammyy ammyyadmin remadm

URLs, FQDN and IP indicators 3

URL Host (FQDN/IP) Date Added
hXXp://aav3.dyndns.tv/AA_v3.exe VirusTotal Report aav3.dyndns.tv VirusTotal Report 2024-10-16 21:01:08
hXXp://arcsystem.rodopibg.net/Aa_v3.exe VirusTotal Report arcsystem.rodopibg.net VirusTotal Report 2024-10-16 18:20:08
hXXp://samson.hr/gogo/AA.exe VirusTotal Report samson.hr VirusTotal Report 2024-10-16 17:52:02

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x86a32 552960 e7068f4d4bce7c8e987241dbf8d46e3d61510536 0db24e9b0c6f51170a412c53204fac3e
.rdata 0x88000 0x194de 106496 752fcf9652884f90b2ded8fd2fb705b4f68181ab 520f1df03a494e1d1269f9d61094eb7d
.data 0xa2000 0x1ad98 81920 5654dbe20e014cdb0caf009a10dca6d203796067 3104ea65674f21bb80a192051e8bb694
.rsrc 0xbd000 0xa658 45056 3516ed2e2424b22fcac5e14d7ea17c4cbc3d058a 3b59cf0be0893b2684a4668ab90605c4

PE Resources 11

Name Language Sublanguage Offset Size Data
BINARY LANG_NEUTRAL SUBLANG_NEUTRAL 0xc38d0 1
RT_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xc5078 308
RT_BITMAP LANG_NEUTRAL SUBLANG_NEUTRAL 0xc4648 1194
RT_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xc27f8 4264
RT_MENU LANG_NEUTRAL SUBLANG_NEUTRAL 0xbda00 250
RT_DIALOG LANG_NEUTRAL SUBLANG_NEUTRAL 0xbf870 156
RT_GROUP_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xc51b0 20
RT_GROUP_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xc38a0 48
RT_VERSION LANG_ENGLISH SUBLANG_ENGLISH_US 0xc4af8 736
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0xbf920 1474
None LANG_NEUTRAL SUBLANG_NEUTRAL 0xbf910 11

Meta infos 13

LegalCopyright:
InternalName: Ammyy Admin
FileVersion: 3.9
FileDescription: Ammyy Admin
SpecialBuild:
CompanyName: Ammyy LLC
LegalTrademarks:
Comments:
ProductName: Ammyy Admin
ProductVersion: 3.9
PrivateBuild:
Translation: 0x0409 0x04b0
OriginalFilename:

Packers detected 3

Microsoft Visual C++ v6.0
Microsoft Visual C++ 5.0
Microsoft Visual C++

Anti debug functions 7

FindWindowA
FindWindowW
GetLastError
GetWindowThreadProcessId
Process32First
Process32Next
TerminateProcess

Anti debug functions 1

VMCheck.dll

File signature

MD5 SHA1 Block size Virtual Address
dd11697fa70b6d905222899ef76c4249 35076570190643354d1a34308ad1e24e26d3e3fd 6288 790528

Strings analysis - File found

Binary
Ammyy_Contact_Book.bin
*.bin
contacts3.bin
_tmp\AMMYY_Admin.bin
settings3.bin
settings.bin
contacts.bin
sessions.bin
Log
eAMMYY_service.log
ammyy.log
ammyy_id.log
Temporary
%sAmmyy_%X.tmp
Object
hhctrl.ocx
Data
%u-%u-%u-%u.dat
Library
W\winsta.dll
Shcore.dll
ewmsgapi.dll
ADVAPI32.dll
SHLWAPI.dll
dwmapi.dll
WININET.dll
WTSAPI32.dll
MSVCRT.dll
SHELL32.dll
WS2_32.dll
COMCTL32.dll
secur32.dll
USER32.dll
USERENV.dll
SETUPAPI.dll
GDI32.dll
KERNEL32.dll
DSOUND.dll
COMDLG32.dll
IPHLPAPI.DLL

Strings analysis - Possible IPs found 2

1.0.0.1
127.0.0.1

Strings analysis - Possible URLs found 16

http://www.ammyy.com/?lang=
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
http://ts-ocsp.ws.symantec.com07
http://ocsp.comodoca.com0
http://crl.thawte.com/ThawteTimestampingCA.crl0
https://secure.comodo.net/CPS0C
http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
http://ocsp.thawte.com0
http://www.ammyy.com/
http://www.ammyy.com
http://schemas.microsoft.com/SMI/2005/WindowsSettings
http://rl.ammyy.com
http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<

Import functions