MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 11df6b403ee5a2e308eff2382fe7ec896a087d14bbee47ed8a02c0a4d940bccf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sality


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments

SHA256 hash: 11df6b403ee5a2e308eff2382fe7ec896a087d14bbee47ed8a02c0a4d940bccf
SHA3-384 hash: ad928976aa151d66ddd1e08418f29f89890d6bb5721ad922adf7551193b2469f4b70403a8f28ef872f5454c73be4a7e1
SHA1 hash: af6668c93f497694e5ed6d7ea59445f60cde31a0
MD5 hash: 6b8a2e6c75a58550d3b7d4b09d3604e1
humanhash: magazine-magnesium-white-apart
File name:svchost.exe
Download: download sample
Signature Sality
File size:168'877 bytes
First seen:2022-08-23 13:59:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7d4588a0360de272d80911753da6f782 (1 x Sality)
ssdeep 3072:aT2xNfzEmPUac0yCRS9EK0TLmmIhIsY33Trsl1RGS6KSIH6hUNYZFF:OkPpe0mmIt+3crcrh8Mn
Threatray 36 similar samples on MalwareBazaar
TLSH T18FF302327AF5E5F6E4A2003DB7D9E6E88FD920C3262778609C40114EADB0D1B5D5EBE1
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon f2f0f0e5e670cec6 (1 x Sality)
Reporter r3dbU7z
Tags:exe ramnit Sality

Intelligence


File Origin
# of uploads :
1
# of downloads :
420
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
svchost.exe
Verdict:
Suspicious activity
Analysis date:
2022-08-23 14:01:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Changing a file
Creating a file
Launching a service
Blocking the Windows Security Center notifications
Blocking the User Account Control
Firewall traversal
Enabling a "Do not show hidden files" option
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coinminer overlay packed ramnit sality virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Ramnit, Sality
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject threads in other processes
Deletes keys which are related to windows safe boot (disables safe mode boot)
Disables UAC (registry)
Disables user account control notifications
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May modify the system service descriptor table (often done to hook functions)
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Writes to foreign memory regions
Yara detected Ramnit
Yara detected Sality
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Sality
Status:
Malicious
First seen:
2022-08-23 14:00:07 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:sality backdoor evasion persistence trojan upx
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
System policy modification
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Checks whether UAC is enabled
Loads dropped DLL
Windows security modification
Executes dropped EXE
UPX packed file
Modifies WinLogon for persistence
Modifies firewall policy service
Sality
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Unpacked files
SH256 hash:
d7724f7dcbfa432d4236902ea46d6ccf63f3f1a3e9b1582a9a48f6ae149150df
MD5 hash:
ba2d1c78c4b3b3fc35770749e9ad5f86
SHA1 hash:
888ba69f247886d09274bf4833e17b5e302a607d
Detections:
win_ramnit_g0 win_ramnit_g1 win_ramnit_auto
SH256 hash:
1ab69d9ad75d58e10c83a38d56ae028e57a94decc9da9515f4341036a0ea1efb
MD5 hash:
ccd57c2af60720f5c93ea3aec7fcde69
SHA1 hash:
c872cd2dd63a9eb195445ee84d692bf9841ac1c9
Detections:
win_ramnit_g0 win_ramnit_g1 win_ramnit_auto
SH256 hash:
dd041821e180423250027f2c7a22a6514786f904c2a984baaeb33be72f68b684
MD5 hash:
51b596e74dd95131d3200c3c3693d02c
SHA1 hash:
2de29f5c83d61bbdf15fe4369c0a1a56c9dd3a02
Detections:
win_ramnit_g0 win_ramnit_auto
SH256 hash:
11df6b403ee5a2e308eff2382fe7ec896a087d14bbee47ed8a02c0a4d940bccf
MD5 hash:
6b8a2e6c75a58550d3b7d4b09d3604e1
SHA1 hash:
af6668c93f497694e5ed6d7ea59445f60cde31a0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_SimplePolyEngine
Author:ditekSHen
Description:Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
Rule name:Ramnit
Author:kevoreilly
Description:Ramnit Payload
Rule name:win_ramnit_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.ramnit.
Rule name:win_sality_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.sality.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Sality

Executable exe 11df6b403ee5a2e308eff2382fe7ec896a087d14bbee47ed8a02c0a4d940bccf

(this sample)

  
Delivery method
Distributed via web download

Comments