AA_v3.5.exe

First submission 2024-10-16 18:57:04

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 746.27 KB (764184 bytes)
Compile time: 2014-09-10 01:23:16
MD5: 2cbf5657ffd8858a9597f296a60270c2
SHA1: b130611c92788337c4f6bb9e9454ff06eb409166
SHA256: 9b3f4d6a9bae4d7f9cfe45e706db8fe4baef51ae12353941e8b1532b231e6eac
Import Hash : 2b9b1c5317109464ffa1c4b594e4f5dc
Sections 4 .text .rdata .data .rsrc
Directories 3 import resource security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 47/77 VT report date: 2024-10-09 20:04:16
Malware Type 3 hacktool trojan pua
Threat Type 3 ammyy ammyyadmin flawedammyy

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXp://www.draconian.co.za/files/Ext/AA_v3.5.exe VirusTotal Report www.draconian.co.za VirusTotal Report 2024-10-16 18:57:04

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x81f12 532480 5b19a666b22b07f83e7d6c39899e5e74af074291 e5efb5cf1e60abb9913633458ca1d505
.rdata 0x83000 0x178fc 98304 8c48261658618f23cd5c47d7153c03250c8f2ecc e0f14bfa8e33bc2280c876139157aef9
.data 0x9b000 0x1a7e0 77824 38387284897c23c25940b4aadbfc8b6c1531ae5d 13b6dffb0fbcf8934d589c6c3bc9ee96
.rsrc 0xb6000 0xa5e0 45056 49ad749bc3f1bf87cf1753deee179e42ebc13fa9 8613de162d33f736c2f72c2e22502a39

PE Resources 11

Name Language Sublanguage Offset Size Data
BINARY LANG_NEUTRAL SUBLANG_NEUTRAL 0xbc3e8 1
RT_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xbe000 308
RT_BITMAP LANG_NEUTRAL SUBLANG_NEUTRAL 0xbd160 1194
RT_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbb310 4264
RT_MENU LANG_NEUTRAL SUBLANG_NEUTRAL 0xb6a00 250
RT_DIALOG LANG_NEUTRAL SUBLANG_NEUTRAL 0xb82f0 784
RT_GROUP_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xbe138 20
RT_GROUP_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbc3b8 48
RT_VERSION LANG_ENGLISH SUBLANG_ENGLISH_US 0xbd610 736
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0xb8780 637
None LANG_NEUTRAL SUBLANG_NEUTRAL 0xb8770 11

Meta infos 13

LegalCopyright:
InternalName: Ammyy Admin
FileVersion: 3.5
FileDescription: Ammyy Admin
SpecialBuild:
CompanyName: Ammyy LLC
LegalTrademarks:
Comments:
ProductName: Ammyy Admin
ProductVersion: 3.5
PrivateBuild:
Translation: 0x0409 0x04b0
OriginalFilename:

Packers detected 3

Microsoft Visual C++ v6.0
Microsoft Visual C++ 5.0
Microsoft Visual C++

Anti debug functions 7

FindWindowA
FindWindowW
GetLastError
GetWindowThreadProcessId
Process32First
Process32Next
TerminateProcess

Anti debug functions 1

VMCheck.dll

File signature

MD5 SHA1 Block size Virtual Address
42221e8fa3d9eac89c4ac31d0fa781f7 e58d00ae14f3192e675396090a6d8b2922df021f 6424 757760

Strings analysis - File found

Binary
Ammyy_Contact_Book.bin
*.bin
contacts3.bin
_tmp\AMMYY_Admin.bin
settings3.bin
settings.bin
contacts.bin
sessions.bin
Log
eAMMYY_service.log
ammyy.log
ammyy_id.log
Temporary
%sAmmyy_%X.tmp
Object
hhctrl.ocx
Library
W\winsta.dll
ewmsgapi.dll
ADVAPI32.dll
SHLWAPI.dll
dwmapi.dll
WTSAPI32.dll
MSVCRT.dll
USER32.dll
SHELL32.dll
WS2_32.dll
COMCTL32.dll
secur32.dll
WININET.dll
USERENV.dll
SETUPAPI.dll
GDI32.dll
KERNEL32.dll
DSOUND.dll
COMDLG32.dll
IPHLPAPI.DLL
msvcp60.dll

Strings analysis - Possible IPs found 2

1.0.0.1
127.0.0.1

Strings analysis - Possible URLs found 18

https://www.verisign.com/cps0
http://www.ammyy.com/?lang=
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
http://ts-ocsp.ws.symantec.com07
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://ocsp.verisign.com0
http://logo.verisign.com/vslogo.gif04
https://www.verisign.com/rpa
http://www.ammyy.com
http://crl.verisign.com/pca3-g5.crl04
https://www.verisign.com/rpa0
http://ocsp.thawte.com0
http://www.ammyy.com/
http://csc3-2010-aia.verisign.com/CSC3-2010.cer0
http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D
http://rl.ammyy.com
http://ocsp.verisign.com0;
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<

Import functions