AA_v3.5.exe
First submission 2024-10-16 18:57:04
File details
File type: | PE32 executable (GUI) Intel 80386, for MS Windows |
Mime type: | application/x-dosexec |
File size: | 746.27 KB (764184 bytes) |
Compile time: | 2014-09-10 01:23:16 |
MD5: | 2cbf5657ffd8858a9597f296a60270c2 |
SHA1: | b130611c92788337c4f6bb9e9454ff06eb409166 |
SHA256: | 9b3f4d6a9bae4d7f9cfe45e706db8fe4baef51ae12353941e8b1532b231e6eac |
Import Hash : | 2b9b1c5317109464ffa1c4b594e4f5dc |
Sections 4 | .text .rdata .data .rsrc |
Directories 3 | import resource security |
File features detected
XOR
OSINT Enrichments
Virus Total: | 47/77 VT report date: 2024-10-09 20:04:16 |
Malware Type 3 | hacktool trojan pua |
Threat Type 3 | ammyy ammyyadmin flawedammyy |
URLs, FQDN and IP indicators 1
PE Sections 0 suspicious
Name | VAddress | VSize | Size | SHA1 | MD5 | Suspicious |
---|---|---|---|---|---|---|
.text | 0x1000 | 0x81f12 | 532480 | 5b19a666b22b07f83e7d6c39899e5e74af074291 | e5efb5cf1e60abb9913633458ca1d505 | |
.rdata | 0x83000 | 0x178fc | 98304 | 8c48261658618f23cd5c47d7153c03250c8f2ecc | e0f14bfa8e33bc2280c876139157aef9 | |
.data | 0x9b000 | 0x1a7e0 | 77824 | 38387284897c23c25940b4aadbfc8b6c1531ae5d | 13b6dffb0fbcf8934d589c6c3bc9ee96 | |
.rsrc | 0xb6000 | 0xa5e0 | 45056 | 49ad749bc3f1bf87cf1753deee179e42ebc13fa9 | 8613de162d33f736c2f72c2e22502a39 |
PE Resources 11
Name | Language | Sublanguage | Offset | Size | Data |
---|---|---|---|---|---|
BINARY | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbc3e8 | 1 | |
RT_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xbe000 | 308 | |
RT_BITMAP | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbd160 | 1194 | |
RT_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbb310 | 4264 | |
RT_MENU | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb6a00 | 250 | |
RT_DIALOG | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb82f0 | 784 | |
RT_GROUP_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xbe138 | 20 | |
RT_GROUP_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbc3b8 | 48 | |
RT_VERSION | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xbd610 | 736 | |
RT_MANIFEST | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb8780 | 637 | |
None | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb8770 | 11 |
Meta infos 13
LegalCopyright: | |
InternalName: | Ammyy Admin |
FileVersion: | 3.5 |
FileDescription: | Ammyy Admin |
SpecialBuild: | |
CompanyName: | Ammyy LLC |
LegalTrademarks: | |
Comments: | |
ProductName: | Ammyy Admin |
ProductVersion: | 3.5 |
PrivateBuild: | |
Translation: | 0x0409 0x04b0 |
OriginalFilename: |
Packers detected 3
Microsoft Visual C++ v6.0 |
Microsoft Visual C++ 5.0 |
Microsoft Visual C++ |
Anti debug functions 7
FindWindowA |
FindWindowW |
GetLastError |
GetWindowThreadProcessId |
Process32First |
Process32Next |
TerminateProcess |
Anti debug functions 1
VMCheck.dll |
File signature
MD5 | SHA1 | Block size | Virtual Address |
---|---|---|---|
42221e8fa3d9eac89c4ac31d0fa781f7 | e58d00ae14f3192e675396090a6d8b2922df021f | 6424 | 757760 |
Strings analysis - File found
Binary |
Ammyy_Contact_Book.bin |
*.bin |
contacts3.bin |
_tmp\AMMYY_Admin.bin |
settings3.bin |
settings.bin |
contacts.bin |
sessions.bin |
Log |
eAMMYY_service.log |
ammyy.log |
ammyy_id.log |
Temporary |
%sAmmyy_%X.tmp |
Object |
hhctrl.ocx |
Library |
W\winsta.dll |
ewmsgapi.dll |
ADVAPI32.dll |
SHLWAPI.dll |
dwmapi.dll |
WTSAPI32.dll |
MSVCRT.dll |
USER32.dll |
SHELL32.dll |
WS2_32.dll |
COMCTL32.dll |
secur32.dll |
WININET.dll |
USERENV.dll |
SETUPAPI.dll |
GDI32.dll |
KERNEL32.dll |
DSOUND.dll |
COMDLG32.dll |
IPHLPAPI.DLL |
msvcp60.dll |
Strings analysis - Possible IPs found 2
1.0.0.1 |
127.0.0.1 |
Strings analysis - Possible URLs found 18
https://www.verisign.com/cps0 |
http://www.ammyy.com/?lang= |
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
http://ts-ocsp.ws.symantec.com07 |
http://crl.thawte.com/ThawteTimestampingCA.crl0 |
http://ocsp.verisign.com0 |
http://logo.verisign.com/vslogo.gif04 |
https://www.verisign.com/rpa |
http://www.ammyy.com |
http://crl.verisign.com/pca3-g5.crl04 |
https://www.verisign.com/rpa0 |
http://ocsp.thawte.com0 |
http://www.ammyy.com/ |
http://csc3-2010-aia.verisign.com/CSC3-2010.cer0 |
http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D |
http://rl.ammyy.com |
http://ocsp.verisign.com0; |
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0< |