lmhost.exe

Ammyy Admin

Ammyy

The application lmhost.exe by Ammyy has been detected as adware by 15 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Ammyy Admin”. While running, it connects to the Internet address pacific1385.us.unmetered.com on port 443.
Publisher:
Ammyy LLC  (signed by Ammyy)

Product:
Ammyy Admin

Version:
3.0

MD5:
7037be973d7d20fd13881b12e4b2ea63

SHA-1:
70566828600eace45eb5091314238f10ba7f4318

Scanner detections:
15 / 68

Status:
Adware

Analysis date:
4/26/2024 3:42:56 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Ammyy
7.1.1

Baidu Antivirus
Hacktool.Win32.RemoteAdmin
4.0.3.151123

Comodo Security
UnclassifiedMalware
20839

Dr.Web
Program.RemoteAdmin.701
9.0.1.0327

ESET NOD32
Win32/RemoteAdmin.Ammyy (variant)
9.11070

Kaspersky
not-a-virus:RemoteAdmin.Win32.Ammyy
14.0.0.1077

McAfee
Artemis!7037BE973D7D
5600.6572

NANO AntiVirus
Riskware.Win32.RemoteAdmin.csowxz
0.30.0.64812

nProtect
Trojan/W32.Agent.730960
15.01.23.01

Qihoo 360 Security
Win32/Virus.RemoteAdmin.de2
1.0.0.1015

Reason Heuristics
PUP.Ammyy (M)
15.11.23.16

Rising Antivirus
PE:Malware.Ammyy!6.854
23.00.65.151121

Sophos
Generic PUA HA
4.98

Trend Micro House Call
TROJ_GEN.R0C1H07KJ14
7.2.327

VIPRE Antivirus
Remote-Access.Win32.Ammyy
36966

File size:
713.8 KB (730,960 bytes)

Product version:
3.0

Original file name:
AMMYY_Admin.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Documents and Settings\{user}\Local settings\temp\{random}.tmp\lmhost.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/3/2011 10:00:00 PM

Valid to:
11/3/2012 9:59:59 PM

Subject:
CN=Ammyy, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ammyy, L=Moscow, S=Moscow, C=RU

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5F442BEEED4174761DED2A9AEF47DE90

File PE Metadata
Compilation timestamp:
9/5/2012 6:37:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:dVr29UGEg6VUM5oAL1jq3E2jjFNOjAqHKtCessZWjya7VM1en9Nm1RtNeCVao2Vp:vUbjbqwCessA41Rt0CVMVZtxP

Entry address:
0x771FE

Entry point:
55, 8B, EC, 6A, FF, 68, B0, 28, 48, 00, 68, A0, 73, 47, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, F0, E4, 47, 00, 59, 83, 0D, D0, D4, 4A, 00, FF, 83, 0D, D4, D4, 4A, 00, FF, FF, 15, EC, E4, 47, 00, 8B, 0D, B8, D4, 4A, 00, 89, 08, FF, 15, E8, E4, 47, 00, 8B, 0D, B4, D4, 4A, 00, 89, 08, A1, E4, E4, 47, 00, 8B, 00, A3, CC, D4, 4A, 00, E8, 62, 1E, FA, FF, 39, 1D, 10, 5E, 4A, 00, 75, 0C, 68, CA, 73, 47, 00, FF, 15, E0, E4...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
500 KB (512,000 bytes)

Service
Display name:
Ammyy Admin

Service name:
AmmyyAdmin

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to static-ip-173-224-123-242.inaddr.ip-pool.com  (173.224.123.242:443)

TCP (HTTP SSL):
Connects to pacific1385.us.unmetered.com  (209.239.123.75:443)

TCP (HTTP):
Connects to static.88-198-6-54.clients.your-server.de  (88.198.6.54:80)

Remove lmhost.exe - Powered by Reason Core Security