General
-
Target
aa_v3.zip
-
Size
424KB
-
Sample
230915-kv19lsce72
-
MD5
c995a6db5bb7210322c72b92b0358393
-
SHA1
96b4e0ac795a92c341d08c6b18f2d2664efd40fc
-
SHA256
0abfee8952acaf9510e25ca4d6f2cdfdc790f527bbfc06d72b63c188a161878b
-
SHA512
5bbf7393f7573cdc5cc095eb94cfd714d0d419628c2d5246c1a7abdaea7dbc1c8fdd938a07dcb6d48e0acf44b9100e6b62dce4e53edeffa6bf75c856ccac5128
-
SSDEEP
6144:t0OF+EXUcqqDPM9hp7532F5P9phb7xtw382MBaouv/huqAh8PhM+53zR25rGC+Kd:tllPYFM/P9pOMhanhXX5Mw24cjvMlk
Behavioral task
behavioral1
Sample
AA_v3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
AA_v3.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
AA_v3.exe
-
Size
798KB
-
MD5
90aadf2247149996ae443e2c82af3730
-
SHA1
050b7eba825412b24e3f02d76d7da5ae97e10502
-
SHA256
ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
-
SHA512
eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
SSDEEP
24576:Uj0JJ4p/A4npt3XojeQG5EtzRtO7GvmDguXd:UjoJ4u4zojegylDN
Score10/10-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-