aa.exe
First submission 2024-10-14 08:05:03
Last sumbission 2024-10-15 20:51:03
File details
File type: | PE32 executable (GUI) Intel 80386, for MS Windows |
Mime type: | application/x-dosexec |
File size: | 762.14 KB (780432 bytes) |
Compile time: | 2017-07-05 21:57:26 |
MD5: | e9b569f7cbf23d91df065c18f4c43840 |
SHA1: | 5d7cb1a2ca7db04edf23dd3ed41125c8c867b0ad |
SHA256: | d67c7ef1c8e2cd56e266902bef814ac328d64bbe06086f4ee24fbadbebf39605 |
Import Hash : | 64720560b6fe716899d329e150e5fb91 |
Sections 4 | .text .rdata .data .rsrc |
Directories 3 | import resource security |
File features detected
XOR
OSINT Enrichments
Virus Total: | 58/77 VT report date: 2024-10-13 23:55:01 |
Malware Type 3 | hacktool trojan pua |
Threat Type 3 | ammyy ammyadmn filereppup |
URLs, FQDN and IP indicators 2
PE Sections 0 suspicious
Name | VAddress | VSize | Size | SHA1 | MD5 | Suspicious |
---|---|---|---|---|---|---|
.text | 0x1000 | 0x8305a | 540672 | c386fe13f8472d71310ea2dca5d7123407ced9a5 | 8aeaf5ba0911231691302eeb3bdfea8f | |
.rdata | 0x85000 | 0x188de | 102400 | b5489ec4a9a959d600b4e3576a338ae8ef00e678 | 61b8db91e05d3da50d77beeefeb87f05 | |
.data | 0x9e000 | 0x1aea8 | 81920 | c68d893c41bce72357494f6eef2d6382fcde1885 | 2160ec8803885bca22c0168b0d488020 | |
.rsrc | 0xb9000 | 0xa1d0 | 45056 | 8f19e6a56cfda5a4503500325d59896ea6fff1c9 | 8f880b72b7e9da5ad38c35fe568763f8 |
PE Resources 11
Name | Language | Sublanguage | Offset | Size | Data |
---|---|---|---|---|---|
BINARY | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbf448 | 1 | |
RT_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xc0bf0 | 308 | |
RT_BITMAP | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xc01c0 | 1194 | |
RT_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbe370 | 4264 | |
RT_MENU | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xb99d0 | 250 | |
RT_DIALOG | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbb350 | 784 | |
RT_GROUP_CURSOR | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xc0d28 | 20 | |
RT_GROUP_ICON | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbf418 | 48 | |
RT_VERSION | LANG_ENGLISH | SUBLANG_ENGLISH_US | 0xc0670 | 736 | |
RT_MANIFEST | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbb7e0 | 637 | |
None | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0xbb7d0 | 11 |
Meta infos 13
LegalCopyright: | |
InternalName: | Ammyy Admin |
FileVersion: | 3.5 |
FileDescription: | Ammyy Admin |
SpecialBuild: | |
CompanyName: | Ammyy LLC |
LegalTrademarks: | |
Comments: | |
ProductName: | Ammyy Admin |
ProductVersion: | 3.5 |
PrivateBuild: | |
Translation: | 0x0409 0x04b0 |
OriginalFilename: |
Packers detected 3
Microsoft Visual C++ v6.0 |
Microsoft Visual C++ 5.0 |
Microsoft Visual C++ |
Anti debug functions 7
FindWindowA |
FindWindowW |
GetLastError |
GetWindowThreadProcessId |
Process32First |
Process32Next |
TerminateProcess |
Anti debug functions 1
VMCheck.dll |
File signature
MD5 | SHA1 | Block size | Virtual Address |
---|---|---|---|
1d2870c6cc43d7096ce78c38079a966c | 57805525d4070fbb350f4ac6886a801cc6df1b58 | 6288 | 774144 |
Strings analysis - File found
Binary |
Ammyy_Contact_Book.bin |
*.bin |
contacts3.bin |
settings.bin |
_tmp\AMMYY_Admin.bin |
settings3.bin |
contacts.bin |
sessions.bin |
Log |
eAMMYY_service.log |
ammyy.log |
Temporary |
%sAmmyy_%X.tmp |
Object |
hhctrl.ocx |
Library |
W\winsta.dll |
ewmsgapi.dll |
ADVAPI32.dll |
SHLWAPI.dll |
dwmapi.dll |
WTSAPI32.dll |
MSVCRT.dll |
USER32.dll |
SHELL32.dll |
WS2_32.dll |
COMCTL32.dll |
secur32.dll |
WININET.dll |
USERENV.dll |
SETUPAPI.dll |
GDI32.dll |
KERNEL32.dll |
DSOUND.dll |
COMDLG32.dll |
IPHLPAPI.DLL |
msvcp60.dll |
Strings analysis - Possible IPs found 2
1.0.0.1 |
127.0.0.1 |
Strings analysis - Possible URLs found 15
http://www.ammyy.com/?lang= |
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
http://ts-ocsp.ws.symantec.com07 |
http://ocsp.comodoca.com0 |
http://crl.thawte.com/ThawteTimestampingCA.crl0 |
https://secure.comodo.net/CPS0C |
http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$ |
http://ocsp.thawte.com0 |
http://www.ammyy.com/ |
http://www.ammyy.com |
http://rl.ammyy.com |
http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$ |
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0< |