AA_v3.5.exe
First submission 2024-10-18 06:15:05
File details
File type: | PE32 executable (GUI) Intel 80386, for MS Windows |
Mime type: | application/x-dosexec |
File size: | 751.49 KB (769528 bytes) |
Compile time: | 2015-05-19 00:21:18 |
MD5: | 5686a7032e37087f0fd082a04f727aad |
SHA1: | 341fee5256dcc259a3a566ca8f0260eb1e60d730 |
SHA256: | 43bba98a64dd96cf0571f3d6dceafdc549cc3767a1beab6fe4a6e1fd3ddd3153 |
Import Hash : | d8da858c6a3f16bedc0335a30faae74b |
Sections 4 | .text .rdata .data .rsrc |
Directories 3 | import resource security |
File features detected
XOR
OSINT Enrichments
Virus Total: | 45/77 VT report date: 2024-10-16 18:38:36 |
Malware Type 3 | hacktool pua trojan |
Threat Type 3 | ammyy ammyyadmin remadm |
URLs, FQDN and IP indicators 1
PE Sections 0 suspicious
Name | VAddress | VSize | Size | SHA1 | MD5 | Suspicious |
---|---|---|---|---|---|---|
.text | 0x1000 | 0x81cd6 | 532480 | 9769c41a80ce0cd0bdab0c4546b977d7c66191f9 | 6c1d1d6ff27fa91fd6ba26bee86639cc | |
.rdata | 0x83000 | 0x17876 | 98304 | 19fa40b51f23a8c66ed85fd37a5df1551e7730ff | cefbb1b9f297a97c0c8bffde68176261 | |
.data | 0x9b000 | 0x1ad20 | 81920 | 16fa5e2fb5a59c2dea6dddf27e5415ed2fad916f | c7e3d8d8ab83ee6a3ac3d42305096470 | |
.rsrc | 0xb6000 | 0xa178 | 45056 | 62fed56a8687849ac4382a7ae0e595e0bf5a92cc | 88871540d5f40346c0862dba1e09db1f |
PE Resources 11
Name | Language | Sublanguage | Offset | Size | Data |
---|---|---|---|---|---|
BINARY | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbc3f0 | 1 | |
RT_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xbdb98 | 308 | |
RT_BITMAP | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbd168 | 1194 | |
RT_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbb318 | 4264 | |
RT_MENU | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb69d0 | 250 | |
RT_DIALOG | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb82f8 | 784 | |
RT_GROUP_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xbdcd0 | 20 | |
RT_GROUP_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbc3c0 | 48 | |
RT_VERSION | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xbd618 | 736 | |
RT_MANIFEST | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb8788 | 637 | |
None | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb8778 | 11 |
Meta infos 13
LegalCopyright: | |
InternalName: | Ammyy Admin |
FileVersion: | 3.5 |
FileDescription: | Ammyy Admin |
SpecialBuild: | |
CompanyName: | Ammyy LLC |
LegalTrademarks: | |
Comments: | |
ProductName: | Ammyy Admin |
ProductVersion: | 3.5 |
PrivateBuild: | |
Translation: | 0x0409 0x04b0 |
OriginalFilename: |
Packers detected 3
Microsoft Visual C++ v6.0 |
Microsoft Visual C++ 5.0 |
Microsoft Visual C++ |
Anti debug functions 7
FindWindowA |
FindWindowW |
GetLastError |
GetWindowThreadProcessId |
Process32First |
Process32Next |
TerminateProcess |
Anti debug functions 1
VMCheck.dll |
File signature
MD5 | SHA1 | Block size | Virtual Address |
---|---|---|---|
c65a6b140099f935242b53d1958c1cfe | ba900e685535e3aa7bb50acf4d9ad955f393ff87 | 7672 | 761856 |
Strings analysis - File found
Binary |
Ammyy_Contact_Book.bin |
*.bin |
contacts3.bin |
_tmp\AMMYY_Admin.bin |
settings3.bin |
settings.bin |
contacts.bin |
sessions.bin |
Log |
eAMMYY_service.log |
ammyy.log |
ammyy_id.log |
Temporary |
%sAmmyy_%X.tmp |
Object |
hhctrl.ocx |
Library |
W\winsta.dll |
ewmsgapi.dll |
ADVAPI32.dll |
SHLWAPI.dll |
dwmapi.dll |
WTSAPI32.dll |
MSVCRT.dll |
USER32.dll |
SHELL32.dll |
WS2_32.dll |
COMCTL32.dll |
secur32.dll |
WININET.dll |
USERENV.dll |
SETUPAPI.dll |
GDI32.dll |
KERNEL32.dll |
DSOUND.dll |
COMDLG32.dll |
IPHLPAPI.DLL |
msvcp60.dll |
Strings analysis - Possible IPs found 2
1.0.0.1 |
127.0.0.1 |
Strings analysis - Possible URLs found 17
http://www.ammyy.com/?lang= |
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
http://ocsp.comodoca.com0 |
http://crl.thawte.com/ThawteTimestampingCA.crl0 |
https://secure.comodo.net/CPS0C |
http://rl.ammyy.com |
http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$ |
http://crl.usertrust.com/AddTrustExternalCARoot.crl05 |
http://ocsp.thawte.com0 |
http://www.ammyy.com/ |
http://ocsp.usertrust.com0 |
http://www.ammyy.com |
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0< |
http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$ |
http://ts-ocsp.ws.symantec.com07 |