General

  • Target

    AA_v3.5_Corporate.bin.zip

  • Size

    380KB

  • Sample

    201121-nvdtnkwk3x

  • MD5

    a0bcdaa6f194f7fb1cfa269a1f5cc44a

  • SHA1

    a2834a33296ca9ec09fa06617f889b3b780f1db5

  • SHA256

    d52862ff3e0511f67cb460107a81415926263366f9a6b2504442ea5314458161

  • SHA512

    38100cb8496a30bc8b144fce0f1236f9d20c7206f1f854cd2b9c61849e6554d9981fb33d1d029fac6becea8fcc390e0bcac1d5b46309e2be8f989918ee487ce9

Score
10/10

Malware Config

Targets

    • Target

      AA_v3.5_Corporate.bin

    • Size

      751KB

    • MD5

      4d853025b8cd8c725bf78e3df6cce967

    • SHA1

      c6bff7857fdf33cbd8f052ef5d669675e5cf06f8

    • SHA256

      4f648c95b8c832742b8b43f4e70689d0ef0328841744858c75d0a4e98fda5ff8

    • SHA512

      977e43eaa763cc66114e00a615818c66a84a5a47bac1cdf21eff9f8f1dcebf138d8ede823265a2f30807d648c57bf036818254964358691d3f9a013f930705cf

    Score
    10/10
    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks