aa_v3.1.exe

Ammyy Admin

Ammyy

The application aa_v3.1.exe by Ammyy has been detected as adware by 6 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “AmmyyAdmin_E08”. The file has been seen being downloaded from dc372.4shared.com and multiple other hosts. While running, it connects to the Internet address rl.ammyy.com on port 80 using the HTTP protocol.
Publisher:
Ammyy LLC  (signed by Ammyy)

Product:
Ammyy Admin

Version:
3.0

MD5:
9561c8f7bd981a9eaac23ec6fa9a65e5

SHA-1:
519d06745dad2be35d2de25f9739b80ea64e1fdd

SHA-256:
0fd5789a6ff2a978eddc093ac89df7192d17fd73825042c44acc844d7aa6517e

Scanner detections:
6 / 68

Status:
Adware

Analysis date:
4/26/2024 1:28:29 AM UTC  (today)

Scan engine
Detection
Engine version

Bkav FE
W32.Cloda1c.Trojan
1.3.0.4677

ESET NOD32
Win32/RemoteAdmin.Ammyy (variant)
7.9298

Kaspersky
not-a-virus:RemoteAdmin.Win32.Ammyy
14.0.0.4564

NANO AntiVirus
Trojan.Win32.RemoteAdmin.cqkogb
0.28.0.57029

Reason Heuristics
PUP.Service.Ammyy.G
14.9.30.13

Rising Antivirus
PE:Malware.Ammyy!6.854
23.00.65.131224

File size:
717.8 KB (735,072 bytes)

Product version:
3.0

Original file name:
AMMYY_Admin.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\aa_v3.1.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/12/2012 2:00:00 AM

Valid to:
12/13/2013 1:59:59 AM

Subject:
CN=Ammyy, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ammyy, L=Moscow, S=Russian Federation, C=RU

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
18CA484C639D98F0F877B32777CF778D

File PE Metadata
Compilation timestamp:
11/22/2012 5:13:05 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:UKHp9fDIItMm2o44sGTdBqWvwD+8ChCbW3XTjY1r1RtH8ePhAU5u0AhpZxAh9gJ:UorLkbDEhyW3XS1RtcePKUBATZxXJ

Entry address:
0x77C2E

Entry point:
55, 8B, EC, 6A, FF, 68, B0, 28, 48, 00, 68, D0, 7D, 47, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, F0, E4, 47, 00, 59, 83, 0D, B0, D8, 4A, 00, FF, 83, 0D, B4, D8, 4A, 00, FF, FF, 15, EC, E4, 47, 00, 8B, 0D, 98, D8, 4A, 00, 89, 08, FF, 15, E8, E4, 47, 00, 8B, 0D, 94, D8, 4A, 00, 89, 08, A1, E4, E4, 47, 00, 8B, 00, A3, AC, D8, 4A, 00, E8, 7B, B3, FA, FF, 39, 1D, F0, 61, 4A, 00, 75, 0C, 68, FA, 7D, 47, 00, FF, 15, E0, E4...
 
[+]

Entropy:
6.6116

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
500 KB (512,000 bytes)

Service
Display name:
AmmyyAdmin_E08

Type:
Win32OwnProcess


The file aa_v3.1.exe has been seen being distributed by the following 14 URLs.

http://dc372.4shared.com/download/.../Ammyy_Admin_31.exe

http://downloads.jhpolice.gov.in/sites/default/files/.../AA_v3.1.exe

http://www.pvsoftware.com.br/.../ammyy.exe

http://www.shahinfotech.in/.../ammyy_setup.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to pacific1385.us.unmetered.com  (209.239.123.75:443)

TCP (HTTP SSL):
Connects to 41.204.109.91.host-telecom.com  (91.109.204.41:443)

TCP (HTTP):
Connects to static-ip-173-224-123-242.inaddr.ip-pool.com  (173.224.123.242:80)

TCP (HTTP):
Connects to rl.ammyy.com  (176.56.184.37:80)

TCP (HTTP SSL):
Connects to static.88-198-6-56.clients.your-server.de  (88.198.6.56:443)

TCP (HTTP SSL):
Connects to static.88-198-6-54.clients.your-server.de  (88.198.6.54:443)

Remove aa_v3.1.exe - Powered by Reason Core Security