General

  • Target

    304767a5d161c49053fcb983a007c4ec90290a8bc7f61eb7539bbb7b9a5558c2N

  • Size

    766KB

  • Sample

    241030-mm42mssqdr

  • MD5

    fb975974833411caa02f60e99801aeb0

  • SHA1

    cabaee807c9cada7188323e9c780131481c076da

  • SHA256

    304767a5d161c49053fcb983a007c4ec90290a8bc7f61eb7539bbb7b9a5558c2

  • SHA512

    7090df5b5ea5e39e8a4c5ff282c46ddcd6199d4d576639395121c78af653c7997a9f839d96e96d934b4f26c42c139d707fad2292da8563af1156b4aa6f694aea

  • SSDEEP

    12288:gpDNc/Xsfu2LVBRKf057C9lRt3i5olGJsxhzagJYa:g5N48fu2hBRK8ilRty5olGJsxNSa

Malware Config

Targets

    • Target

      304767a5d161c49053fcb983a007c4ec90290a8bc7f61eb7539bbb7b9a5558c2N

    • Size

      766KB

    • MD5

      fb975974833411caa02f60e99801aeb0

    • SHA1

      cabaee807c9cada7188323e9c780131481c076da

    • SHA256

      304767a5d161c49053fcb983a007c4ec90290a8bc7f61eb7539bbb7b9a5558c2

    • SHA512

      7090df5b5ea5e39e8a4c5ff282c46ddcd6199d4d576639395121c78af653c7997a9f839d96e96d934b4f26c42c139d707fad2292da8563af1156b4aa6f694aea

    • SSDEEP

      12288:gpDNc/Xsfu2LVBRKf057C9lRt3i5olGJsxhzagJYa:g5N48fu2hBRK8ilRty5olGJsxNSa

    • Ammyy Admin

      Remote admin tool with various capabilities.

    • AmmyyAdmin payload

    • Ammyyadmin family

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Flawedammyy family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks