General

  • Target

    AA_v3.5.exe

  • Size

    391KB

  • Sample

    230703-g75wsagc3s

  • MD5

    4fe41e6d3c01eb51d79fcf3f3786df4d

  • SHA1

    c05222b5bda44a61e46be2abb4ac0a0477c1e3b2

  • SHA256

    0778c5742af8ce5cd562449ab529304434d3948f1c4fb68702824ae478844fc0

  • SHA512

    a9f0e8245b48bdda0dc0c903755e3ca3e6658f408a7f1f67d705f2b9f317b2d6bc87ecbdbd1a431f8c2b0cb63fe8eb5441ae708586b9ae26121cba9de07db1de

  • SSDEEP

    12288:XNkEFw93WU/SMmmMdlc+hEHBu3mNa11rJA3Lg:XNkmwQBVmHM2NSrm7g

Malware Config

Targets

    • Target

      Device/HarddiskVolume2/Rahman/Discoverer/Softwares/Remote connection softwares/AA_v3.5.exe

    • Size

      746KB

    • MD5

      2cbf5657ffd8858a9597f296a60270c2

    • SHA1

      b130611c92788337c4f6bb9e9454ff06eb409166

    • SHA256

      9b3f4d6a9bae4d7f9cfe45e706db8fe4baef51ae12353941e8b1532b231e6eac

    • SHA512

      06339a299c8c9ce55e9b96582e54e0bf9e04f894ceb47c07486adf8b0140c2a01fd0932207aca8112ee0b16ba8711fee9435e37339aafb94f167b5a736ee7d0b

    • SSDEEP

      12288:6NgEvTkYGzXUMA7PTgM0YOg26y4RtcxcUwhqb3omaY80NP6gL:6XTszE7PTgM0YOgA4RtcbwhsSYFVL

    Score
    10/10
    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks