General
-
Target
AA_v3.5_Corporate.bin.zip
-
Size
380KB
-
Sample
201121-nvdtnkwk3x
-
MD5
a0bcdaa6f194f7fb1cfa269a1f5cc44a
-
SHA1
a2834a33296ca9ec09fa06617f889b3b780f1db5
-
SHA256
d52862ff3e0511f67cb460107a81415926263366f9a6b2504442ea5314458161
-
SHA512
38100cb8496a30bc8b144fce0f1236f9d20c7206f1f854cd2b9c61849e6554d9981fb33d1d029fac6becea8fcc390e0bcac1d5b46309e2be8f989918ee487ce9
Static task
static1
Behavioral task
behavioral1
Sample
AA_v3.5_Corporate.bin.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
AA_v3.5_Corporate.bin.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
AA_v3.5_Corporate.bin
-
Size
751KB
-
MD5
4d853025b8cd8c725bf78e3df6cce967
-
SHA1
c6bff7857fdf33cbd8f052ef5d669675e5cf06f8
-
SHA256
4f648c95b8c832742b8b43f4e70689d0ef0328841744858c75d0a4e98fda5ff8
-
SHA512
977e43eaa763cc66114e00a615818c66a84a5a47bac1cdf21eff9f8f1dcebf138d8ede823265a2f30807d648c57bf036818254964358691d3f9a013f930705cf
Score10/10-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Drops file in System32 directory
-