aa_v3.exe

Ammyy Admin

Ammyy

The application aa_v3.exe by Ammyy has been detected as adware by 16 anti-malware scanners. The file has been seen being downloaded from www.suportepel.com.br and multiple other hosts. While running, it connects to the Internet address pacific1385.us.unmetered.com on port 443.
Publisher:
Ammyy LLC  (signed by Ammyy)

Product:
Ammyy Admin

Version:
3.0

MD5:
f9cde592fcd907fb00807124df17c2f1

SHA-1:
2201acef47c9fea390c1c5ccd2e67257f5551b77

SHA-256:
340a356069ed1a46f831d55ecb64e66c450dc40802ee5cbdc20dd25e70459aa9

Scanner detections:
16 / 68

Status:
Adware

Analysis date:
4/19/2024 3:06:39 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin
7.1.1

AhnLab V3 Security
PUP/Win32.RemoteAdmin
2014.08.19

Avira AntiVirus
SPR/RemoteAdmin.AB
7.11.124.22

avast!
Win32:PUP-gen [PUP]
2014.9-140215

Baidu Antivirus
HackTool.Win32.RemoteAdmin
4.0.3.14816

Bkav FE
W32.Clod820.Trojan
1.3.0.4613

Comodo Security
UnclassifiedMalware
19241

Dr.Web
Program.RemoteAdmin.701
9.0.1.0219

ESET NOD32
Win32/RemoteAdmin.Ammyy (variant)
7.9252

K7 AntiVirus
Unwanted-Program
13.174.10644

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
14.0.0.4590

NANO AntiVirus
Trojan.Win32.RemoteAdmin.cqwpdg
0.28.0.57473

nProtect
Trojan/W32.Agent.730960
13.12.26.02

Reason Heuristics
PUP.Ammyy.F
14.9.30.13

Rising Antivirus
PE:Malware.Ammyy!6.854
23.00.65.131219

VIPRE Antivirus
Trojan.Win32.Generic
25192

File size:
705.8 KB (722,736 bytes)

Product version:
3.0

Original file name:
AMMYY_Admin.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/4/2011 5:30:00 AM

Valid to:
11/4/2012 5:29:59 AM

Subject:
CN=Ammyy, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ammyy, L=Moscow, S=Moscow, C=RU

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5F442BEEED4174761DED2A9AEF47DE90

File PE Metadata
Compilation timestamp:
3/18/2012 3:21:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:fhjun1eaHjs7C8la0n9lp9Dkb1RtgA93ykM+TZtC3lgk:lqeOs7C840n9lpG1Rtb93IKZtfk

Entry address:
0x76E9E

Entry point:
55, 8B, EC, 6A, FF, 68, B0, 18, 48, 00, 68, 40, 70, 47, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, F0, D4, 47, 00, 59, 83, 0D, 98, AC, 4A, 00, FF, 83, 0D, 9C, AC, 4A, 00, FF, FF, 15, EC, D4, 47, 00, 8B, 0D, 80, AC, 4A, 00, 89, 08, FF, 15, E8, D4, 47, 00, 8B, 0D, 7C, AC, 4A, 00, 89, 08, A1, E4, D4, 47, 00, 8B, 00, A3, 94, AC, 4A, 00, E8, BF, E8, FA, FF, 39, 1D, E0, 35, 4A, 00, 75, 0C, 68, 6A, 70, 47, 00, FF, 15, E0, D4...
 
[+]

Entropy:
6.6095

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
496 KB (507,904 bytes)

Windows Firewall Allowed Program
Name:
C:\Documents and Settings\User\Desktop\AA_v3.exe


The file aa_v3.exe has been seen being distributed by the following 24 URLs.

http://www.suportepel.com.br/.../Suporte2.exe

http://www.bmby.com/.../remote.php?mbeat=1

http://www.isakos-soft.gr/ThyraeUpdates/Greek/.../RA.exe

https://www.bmby.com/.../remote.php?mbeat=1

http://www.redsis.com.br/.../aa_v3.exe

http://www.150.co.il/AMMYY.exe

https://dl-mail.ymail.com/ws/download/mailboxes/@.id==VjJ-t5FCogfxkFEaHhbrOOI40MdrW7JpR4c0tkSp-sEexadZnC_MIqiTlqrKa62y-YerpXSQPIt7834jXjyRXCwNNg/messages/@.id==AGnsw0MABYmpVzi5VAE0mGUKjKs/content/parts/@.id==3/raw?appid=YahooMailNeo&token=zitEzqOML3j84e6ealFTT5U7-km5qEQF52lp7AcCuBZUNifLAEpk4yyXrskdAT_tU_TLAKhrrAxOP3pYDkL2lg&error=https://us-mg6.mail.yahoo.com/.../iframemsg?id=5644f0bd-e237-a6e3-d82a-ccea92e11bb1&ymreqid=ddd00588-21eb-5c82-0114-940010010000

http://150.co.il/AMMYY_Admin.exe

http://124.153.118.168/.../downloadlist.aspx?cat=3

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to static-ip-173-224-123-242.inaddr.ip-pool.com  (173.224.123.242:443)

TCP (HTTP SSL):
Connects to pacific1385.us.unmetered.com  (209.239.123.75:443)

TCP (HTTP SSL):
Connects to static.88-198-6-54.clients.your-server.de  (88.198.6.54:443)

TCP (HTTP):
Connects to rl.ammyy.com  (176.56.184.37:80)

Remove aa_v3.exe - Powered by Reason Core Security