AA_v3.5.exe

First submission 2024-10-18 06:15:05

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 751.49 KB (769528 bytes)
Compile time: 2015-05-19 00:21:18
MD5: 5686a7032e37087f0fd082a04f727aad
SHA1: 341fee5256dcc259a3a566ca8f0260eb1e60d730
SHA256: 43bba98a64dd96cf0571f3d6dceafdc549cc3767a1beab6fe4a6e1fd3ddd3153
Import Hash : d8da858c6a3f16bedc0335a30faae74b
Sections 4 .text .rdata .data .rsrc
Directories 3 import resource security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 45/77 VT report date: 2024-10-16 18:38:36
Malware Type 3 hacktool pua trojan
Threat Type 3 ammyy ammyyadmin remadm

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXp://180.150.240.238/1111111/AA_v3.5.exe VirusTotal Report 180.150.240.238 VirusTotal Report 2024-10-18 06:15:06

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x81cd6 532480 9769c41a80ce0cd0bdab0c4546b977d7c66191f9 6c1d1d6ff27fa91fd6ba26bee86639cc
.rdata 0x83000 0x17876 98304 19fa40b51f23a8c66ed85fd37a5df1551e7730ff cefbb1b9f297a97c0c8bffde68176261
.data 0x9b000 0x1ad20 81920 16fa5e2fb5a59c2dea6dddf27e5415ed2fad916f c7e3d8d8ab83ee6a3ac3d42305096470
.rsrc 0xb6000 0xa178 45056 62fed56a8687849ac4382a7ae0e595e0bf5a92cc 88871540d5f40346c0862dba1e09db1f

PE Resources 11

Name Language Sublanguage Offset Size Data
BINARY LANG_NEUTRAL SUBLANG_NEUTRAL 0xbc3f0 1
RT_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xbdb98 308
RT_BITMAP LANG_NEUTRAL SUBLANG_NEUTRAL 0xbd168 1194
RT_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbb318 4264
RT_MENU LANG_NEUTRAL SUBLANG_NEUTRAL 0xb69d0 250
RT_DIALOG LANG_NEUTRAL SUBLANG_NEUTRAL 0xb82f8 784
RT_GROUP_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xbdcd0 20
RT_GROUP_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbc3c0 48
RT_VERSION LANG_ENGLISH SUBLANG_ENGLISH_US 0xbd618 736
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0xb8788 637
None LANG_NEUTRAL SUBLANG_NEUTRAL 0xb8778 11

Meta infos 13

LegalCopyright:
InternalName: Ammyy Admin
FileVersion: 3.5
FileDescription: Ammyy Admin
SpecialBuild:
CompanyName: Ammyy LLC
LegalTrademarks:
Comments:
ProductName: Ammyy Admin
ProductVersion: 3.5
PrivateBuild:
Translation: 0x0409 0x04b0
OriginalFilename:

Packers detected 3

Microsoft Visual C++ v6.0
Microsoft Visual C++ 5.0
Microsoft Visual C++

Anti debug functions 7

FindWindowA
FindWindowW
GetLastError
GetWindowThreadProcessId
Process32First
Process32Next
TerminateProcess

Anti debug functions 1

VMCheck.dll

File signature

MD5 SHA1 Block size Virtual Address
c65a6b140099f935242b53d1958c1cfe ba900e685535e3aa7bb50acf4d9ad955f393ff87 7672 761856

Strings analysis - File found

Binary
Ammyy_Contact_Book.bin
*.bin
contacts3.bin
_tmp\AMMYY_Admin.bin
settings3.bin
settings.bin
contacts.bin
sessions.bin
Log
eAMMYY_service.log
ammyy.log
ammyy_id.log
Temporary
%sAmmyy_%X.tmp
Object
hhctrl.ocx
Library
W\winsta.dll
ewmsgapi.dll
ADVAPI32.dll
SHLWAPI.dll
dwmapi.dll
WTSAPI32.dll
MSVCRT.dll
USER32.dll
SHELL32.dll
WS2_32.dll
COMCTL32.dll
secur32.dll
WININET.dll
USERENV.dll
SETUPAPI.dll
GDI32.dll
KERNEL32.dll
DSOUND.dll
COMDLG32.dll
IPHLPAPI.DLL
msvcp60.dll

Strings analysis - Possible IPs found 2

1.0.0.1
127.0.0.1

Strings analysis - Possible URLs found 17

http://www.ammyy.com/?lang=
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
http://ocsp.comodoca.com0
http://crl.thawte.com/ThawteTimestampingCA.crl0
https://secure.comodo.net/CPS0C
http://rl.ammyy.com
http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
http://crl.usertrust.com/AddTrustExternalCARoot.crl05
http://ocsp.thawte.com0
http://www.ammyy.com/
http://ocsp.usertrust.com0
http://www.ammyy.com
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$
http://ts-ocsp.ws.symantec.com07

Import functions