MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 002a1fb348c592c6464f6f5a2a7a47a0e097733da8e9ae1aa939e86bd0fc75a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Sality
Vendor detections: 16
| SHA256 hash: | 002a1fb348c592c6464f6f5a2a7a47a0e097733da8e9ae1aa939e86bd0fc75a2 |
|---|---|
| SHA3-384 hash: | 055d294f4116eaa8de306ec5c156dec600d80207299b96a6f9c96a35bf364eabb35a0d8d271806278c67d1d0fa6810bf |
| SHA1 hash: | 8db6dad9b0c9aea9cb8c5aebc6266120bd89c682 |
| MD5 hash: | ad45e47746a9e062648b65fabbbfeeff |
| humanhash: | hotel-minnesota-social-uranus |
| File name: | 002a1fb348c592c6464f6f5a2a7a47a0e097733da8e9ae1aa939e86bd0fc75a2.exe |
| Download: | download sample |
| Signature | Sality |
| File size: | 103'140 bytes |
| First seen: | 2025-06-25 14:10:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 14610dd0ebbc796a9a3a2ba2cdd24e79 (10 x Sality) |
| ssdeep | 1536:VHhHBnbY4BEmqEihwtpqR/q+SU0Fk0rE1cC+QwEzFGhd9hyYPPbGm:VHhhbqpqqR/eU0F9E1cCdyd9hyo |
| TLSH | T1B0A3021508B2DD20F6C6417850C696782C8567E501EAF5BE37913DB4C0BB6EAAAF733C |
| Magika | pebin |
| Reporter | Anonymous |
| Tags: | exe Sality |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Malware Config
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_EXE_Packed_SimplePolyEngine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | Sality_Malware_Oct16 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects an unspecififed malware - October 2016 |
| Reference: | Internal Research |
| Rule name: | Sality_Malware_Oct16_RID2E9B |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an unspecififed malware - October 2016 |
| Reference: | Internal Research |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXProtectorv10x2 |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.