Skip to content

S0381 FlawedAmmyy

FlawedAmmyy is a remote access tool (RAT) that was first seen in early 2016. The code for FlawedAmmyy was based on leaked source code for a version of Ammyy Admin, a remote access software.1

Item Value
ID S0381
Associated Names
Version 1.2
Created 28 May 2019
Last Modified 18 July 2022
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols FlawedAmmyy has used HTTP for C2.1
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder FlawedAmmyy has established persistence via the HKCU\SOFTWARE\microsoft\windows\currentversion\run registry key.2
enterprise T1115 Clipboard Data FlawedAmmyy can collect clipboard data.2
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.001 PowerShell FlawedAmmyy has used PowerShell to execute commands.2
enterprise T1059.003 Windows Command Shell FlawedAmmyy has used cmd to execute commands on a compromised host.2
enterprise T1005 Data from Local System FlawedAmmyy has collected information and files from a compromised machine.2
enterprise T1001 Data Obfuscation FlawedAmmyy may obfuscate portions of the initial C2 handshake.1
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography FlawedAmmyy has used SEAL encryption during the initial C2 handshake.1
enterprise T1041 Exfiltration Over C2 Channel FlawedAmmyy has sent data collected from a compromised host to its C2 servers.2
enterprise T1070 Indicator Removal -
enterprise T1070.004 File Deletion FlawedAmmyy can execute batch scripts to delete files.2
enterprise T1105 Ingress Tool Transfer FlawedAmmyy can transfer files from C2.2
enterprise T1056 Input Capture FlawedAmmyy can collect mouse events.2
enterprise T1056.001 Keylogging FlawedAmmyy can collect keyboard events.2
enterprise T1120 Peripheral Device Discovery FlawedAmmyy will attempt to detect if a usable smart card is current inserted into a card reader.1
enterprise T1069 Permission Groups Discovery -
enterprise T1069.001 Local Groups FlawedAmmyy enumerates the privilege level of the victim during the initial infection.12
enterprise T1113 Screen Capture FlawedAmmyy can capture screenshots.2
enterprise T1518 Software Discovery -
enterprise T1518.001 Security Software Discovery FlawedAmmyy will attempt to detect anti-virus products during the initial infection.1
enterprise T1218 System Binary Proxy Execution -
enterprise T1218.007 Msiexec FlawedAmmyy has been installed via msiexec.exe.2
enterprise T1218.011 Rundll32 FlawedAmmyy has used rundll32 for execution.2
enterprise T1082 System Information Discovery FlawedAmmyy can collect the victim’s operating system and computer name during the initial infection.1
enterprise T1033 System Owner/User Discovery FlawedAmmyy enumerates the current user during the initial infection.12
enterprise T1047 Windows Management Instrumentation FlawedAmmyy leverages WMI to enumerate anti-virus on the victim.1

Groups That Use This Software

ID Name References
G0037 FIN6 3
G0092 TA505 145