AA_v3.exe

First submission 2024-10-16 18:10:02

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 792.0 KB (811008 bytes)
Compile time: 2020-09-15 18:09:42
MD5: ee50ecb3152bdebe5fff2cc3cfb4d451
SHA1: cfefd6bbf7b4ad68dcc1ab826d1c788b3f6efa50
SHA256: 5b39f6d054344333059662e486d89617546397016fe50192777bc7afeabe9107
Import Hash : 3e985254f2e34ad96da799a2a5d33efe
Sections 4 .text .rdata .data .rsrc
Directories 2 import resource

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXp://technoweb.homeip.net/majauto/AA_v3.exe VirusTotal Report technoweb.homeip.net VirusTotal Report 2024-10-16 18:10:02

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x8dbba 581632 8b8c57811f823784195ede1cf2bb86df0e6cab2c e9fdccbf9b6e9c08d2d25203218da990
.rdata 0x8f000 0x1a5a6 110592 49aef74be74bb96ad1bc51640e399712e06b70e3 9e1fe715f2c3b902583721ecc37f38a2
.data 0xaa000 0x1ebb8 94208 4d0d637a3e92cb4889e9461286182531a99db60c f656b81b1a65cc5cd37a0a06e6db25eb
.rsrc 0xc9000 0x46f0 20480 f5c082644b045cfc4eb08e5dae20e8945f6c96a4 e856b11880d27941fe2df573a1a08cdb

PE Resources 5

Name Language Sublanguage Offset Size Data
BINARY LANG_NEUTRAL SUBLANG_NEUTRAL 0xc91e8 51
RT_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xca7ac 9832
RT_GROUP_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xcce14 48
RT_VERSION LANG_ENGLISH SUBLANG_ENGLISH_US 0xcce44 744
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0xcd12c 1474

Meta infos 13

LegalCopyright:
InternalName: Ammyy Admin
FileVersion: 3.10
FileDescription: Ammyy Admin
SpecialBuild:
CompanyName: Ammyy LLC
LegalTrademarks:
Comments:
ProductName: Ammyy Admin
ProductVersion: 3.10
PrivateBuild:
Translation: 0x0409 0x04b0
OriginalFilename:

Packers detected 3

Microsoft Visual C++ v6.0
Microsoft Visual C++ 5.0
Microsoft Visual C++

Anti debug functions 7

FindWindowA
FindWindowW
GetLastError
GetWindowThreadProcessId
Process32First
Process32Next
TerminateProcess

Anti debug functions 1

VMCheck.dll

Strings analysis - File found

Binary
Ammyy_Contact_Book.bin
*.bin
contacts3.bin
_tmp\AMMYY_Admin.bin
settings3.bin
settings.bin
contacts.bin
sessions.bin
Log
eAMMYY_service.log
access.log
ammyy.log
ammyy_id.log
Temporary
%sAmmyy_%X.tmp
_%.4hu-%.2hu%.2hu-%.2hu%.2hu%.2hu-%.3hu.tmp
Object
hhctrl.ocx
Data
%u-%u-%u-%u.dat
Library
W\winsta.dll
Shcore.dll
ewmsgapi.dll
ADVAPI32.dll
SHLWAPI.dll
dwmapi.dll
WININET.dll
WTSAPI32.dll
MSVCRT.dll
SHELL32.dll
WS2_32.dll
COMCTL32.dll
secur32.dll
USER32.dll
USERENV.dll
SETUPAPI.dll
GDI32.dll
KERNEL32.dll
DSOUND.dll
COMDLG32.dll
IPHLPAPI.DLL

Strings analysis - Possible IPs found 1

127.0.0.1

Strings analysis - Possible URLs found 6

http://www.ammyy.com/?lang=
https://www.groupe-pam.net
http://www.ammyy.com/
https://
http://www.ammyy.com
http://rl.ammyy.com

Import functions

Name Latest seen MD5
ammyadmin.exe 2024-10-18 05:20:12 90aadf2247149996ae443e2c82af3730
support.exe 2024-10-16 18:14:02 69a8ed0b8edc940968f8535c20b4bbe4