aa_v3.exe

First submission 2024-10-16 17:57:07

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 782.12 KB (800888 bytes)
Compile time: 2020-06-29 13:44:28
MD5: 9054fe003778dd05b3b1438d236963ae
SHA1: 37636571bf2ca072a405303918bd9969680e28e3
SHA256: 7faba6269c05fdda9ee0045aebb835161f0f5d7405e60db1471172bc4e674bda
Import Hash : aab70a9cced02bd065fc31c24eedf2cc
Sections 4 .text .rdata .data .rsrc
Directories 3 import resource security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 52/76 VT report date: 2024-01-18 13:36:23
Malware Type 3 hacktool trojan pua
Threat Type 3 ammyy aagu ammyyadmin

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXp://se.maina-vira.ru:8080/distr/apps/aa_v3.exe VirusTotal Report se.maina-vira.ru VirusTotal Report 2024-10-16 17:57:07

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x875ee 557056 34b1cca6585a2720bcf1c05cff440da2e83cda7d ecfa890ef946bb25694bcd5dfc733fcd
.rdata 0x89000 0x198ae 106496 14ea6662bdd24666da431c84e86f7c1567f2d523 6143614c9c5386c637348e698b85a6d5
.data 0xa3000 0x1ae80 81920 9fb3baedec8cdb4ec07ad27e20f276a8cf97f468 683f316fb116db83627dcaa9c6d7a725
.rsrc 0xbe000 0xa648 45056 cb89a66921a23f46f609a150fd37a592e25087c1 2ff37c4dfb41e162965966c2dd39eeb5

PE Resources 11

Name Language Sublanguage Offset Size Data
BINARY LANG_NEUTRAL SUBLANG_NEUTRAL 0xc48c0 1
RT_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xc6068 308
RT_BITMAP LANG_NEUTRAL SUBLANG_NEUTRAL 0xc5638 1194
RT_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xc37e8 4264
RT_MENU LANG_NEUTRAL SUBLANG_NEUTRAL 0xbea00 250
RT_DIALOG LANG_NEUTRAL SUBLANG_NEUTRAL 0xc0860 156
RT_GROUP_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xc61a0 20
RT_GROUP_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xc4890 48
RT_VERSION LANG_ENGLISH SUBLANG_ENGLISH_US 0xc5ae8 736
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0xc0910 1474
None LANG_NEUTRAL SUBLANG_NEUTRAL 0xc0900 11

Meta infos 13

LegalCopyright:
InternalName: Ammyy Admin
FileVersion: 3.9
FileDescription: Ammyy Admin
SpecialBuild:
CompanyName: Ammyy LLC
LegalTrademarks:
Comments:
ProductName: Ammyy Admin
ProductVersion: 3.9
PrivateBuild:
Translation: 0x0409 0x04b0
OriginalFilename:

Packers detected 3

Microsoft Visual C++ v6.0
Microsoft Visual C++ 5.0
Microsoft Visual C++

Anti debug functions 7

FindWindowA
FindWindowW
GetLastError
GetWindowThreadProcessId
Process32First
Process32Next
TerminateProcess

Anti debug functions 1

VMCheck.dll

File signature

MD5 SHA1 Block size Virtual Address
680ab796b6d11fb33790923f94f84252 1a6af554c6ef0be02d39498cc294814d57165231 6264 794624

Strings analysis - File found

Binary
Ammyy_Contact_Book.bin
*.bin
contacts3.bin
_tmp\AMMYY_Admin.bin
settings3.bin
settings.bin
contacts.bin
sessions.bin
Log
eAMMYY_service.log
ammyy.log
ammyy_id.log
Temporary
%sAmmyy_%X.tmp
Object
hhctrl.ocx
Data
%u-%u-%u-%u.dat
Library
W\winsta.dll
Shcore.dll
ewmsgapi.dll
ADVAPI32.dll
SHLWAPI.dll
dwmapi.dll
WTSAPI32.dll
MSVCRT.dll
SHELL32.dll
WS2_32.dll
COMCTL32.dll
secur32.dll
WININET.dll
USER32.dll
USERENV.dll
SETUPAPI.dll
GDI32.dll
KERNEL32.dll
DSOUND.dll
COMDLG32.dll
IPHLPAPI.DLL

Strings analysis - Possible IPs found 2

1.0.0.1
127.0.0.1

Strings analysis - Possible URLs found 17

http://www.ammyy.com/?lang=
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
http://ts-ocsp.ws.symantec.com07
http://ocsp.sectigo.com0
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt0%
http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl0v
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
https://sectigo.com/CPS0C
http://ocsp.thawte.com0
http://www.ammyy.com/
http://ocsp.usertrust.com0
http://www.ammyy.com
http://schemas.microsoft.com/SMI/2005/WindowsSettings
http://rl.ammyy.com
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<

Import functions