General

  • Target

    AA_v3.5.exe

  • Size

    391KB

  • MD5

    4fe41e6d3c01eb51d79fcf3f3786df4d

  • SHA1

    c05222b5bda44a61e46be2abb4ac0a0477c1e3b2

  • SHA256

    0778c5742af8ce5cd562449ab529304434d3948f1c4fb68702824ae478844fc0

  • SHA512

    a9f0e8245b48bdda0dc0c903755e3ca3e6658f408a7f1f67d705f2b9f317b2d6bc87ecbdbd1a431f8c2b0cb63fe8eb5441ae708586b9ae26121cba9de07db1de

  • SSDEEP

    12288:XNkEFw93WU/SMmmMdlc+hEHBu3mNa11rJA3Lg:XNkmwQBVmHM2NSrm7g

Score
10/10

Malware Config

Signatures

  • AmmyyAdmin payload 1 IoCs
  • Ammyyadmin family

Files

  • AA_v3.5.exe
    .zip

    Password: S@ndb0x!2023@@

  • Device/HarddiskVolume2/Rahman/Discoverer/Softwares/Remote connection softwares/AA_v3.5.exe
    .exe windows x86

    Password: S@ndb0x!2023@@

    2b9b1c5317109464ffa1c4b594e4f5dc


    Code Sign

    Headers

    Imports

    Sections

  • manifest.json