General

  • Target

    a7a68401d1b4ab13135bbe04a083dcb0bc751d36a72abbec85918e3a4b18174b

  • Size

    306KB

  • Sample

    250213-e8zp2ssrdj

  • MD5

    1c5fa30ac1652296c3526c8e800a5e49

  • SHA1

    e33f6529a4006f1cc6fbff87ee9020c7be2c151b

  • SHA256

    a7a68401d1b4ab13135bbe04a083dcb0bc751d36a72abbec85918e3a4b18174b

  • SHA512

    3527856cf955292b72cfcdc2b9419d6ea2158ffd2ef4e39081cd922b124b6c674ad2d55d9183c5385b7e6fead2f04bf6e9a9bce7ccdbc9e35d6bca188a26d70e

  • SSDEEP

    6144:rBtRaIEzE5e/ds2QGeJjB1R7EsisazYaNA/6EOiqURhUcsJ:/EzWpAOjQsitUqA/6/iqUReci

Malware Config

Targets

    • Target

      AMMYY_Admin.exe

    • Size

      651KB

    • MD5

      b730e7b8f3eebd51dc21d7997313b890

    • SHA1

      57ef7a2d07f3703f84c1d7ad33e34e550d23a6fa

    • SHA256

      e4a87095c27219afe9c7a3cb01c13de899e201d2340748a5fc446207c8f99b2a

    • SHA512

      05e87e0ac0e6c097cec3e3801c66752f1a69bd3f8b732062b16596fd4e46388e66eb2e4455ede69769dad62cb7a063849cc2199c140c6ba6a498173eaafe051d

    • SSDEEP

      12288:caA9OKLSwaIN5U8xvFoRQMEoO2rx8ikfRtjIe9rtv8zl6mi/gQ:AkK+waI8JRQMEJ2rufRtse9rtv8zlBi3

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Flawedammyy family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks