General

  • Target

    AA_v3.5 (2015_07_11 06_04_37 UTC).exe

  • Size

    391KB

  • MD5

    0b83e41f1cf2e3e3970ff6cf0d6b7c50

  • SHA1

    f637a9a2b52656a92d4b42de076a04033d7d2101

  • SHA256

    bad522b505bc4e631548651793110704b082be27dbaa6ab583f83fe2e9f28dda

  • SHA512

    49e3e1801aa9b73261ba2f529fb91fa4088bb2cddb4a356591ec6e7ecb7b70cba480194fed10884743ffc3a35c51dbb404af3b45216f0be8b3b8596aafa6bcc1

  • SSDEEP

    6144:DNut4VbcuyxnBK9DzjFY6n3DUCdelF26SEHe8qQK5tXPvPqpKn4lRMsclGbirwnD:DNue+9BK926gG+1Hj05xqU4lRbbvJGI

Score
10/10

Malware Config

Signatures

  • AmmyyAdmin payload 1 IoCs
  • Ammyyadmin family

Files

  • AA_v3.5 (2015_07_11 06_04_37 UTC).exe
    .zip

    Password: S@ndb0x!2023@@

  • Device/HarddiskVolume5/MyOld/File_History/[email protected]/LTP-310/Data/C/Users/Santhosh.VIRTUSHOLDING/Desktop/AA_v3.5 (2015_07_11 06_04_37 UTC).exe
    .exe windows x86

    Password: S@ndb0x!2023@@

    59bc1054f3fb6d52d677cef7c12118a3


    Code Sign

    Headers

    Imports

    Sections

  • manifest.json