MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 30a9291c7713404a55cc3025689f8305aaf31fb9492a5612841b80f1d2aa45ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Sality
Vendor detections: 15
| SHA256 hash: | 30a9291c7713404a55cc3025689f8305aaf31fb9492a5612841b80f1d2aa45ad |
|---|---|
| SHA3-384 hash: | 4058601b8d59bdade12f77e61e9e438d62e8cb1b88d20690025c369db15e0fea1a0fdd59b71bd6329d64ef35742cba1b |
| SHA1 hash: | e6ae4dd7729fe30104c594d4bc7ee0f15cca4a7f |
| MD5 hash: | 9caa356fa5581b7e8f7d7e64d520223d |
| humanhash: | seven-yellow-table-low |
| File name: | file |
| Download: | download sample |
| Signature | Sality |
| File size: | 1'023'725 bytes |
| First seen: | 2025-08-20 16:13:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ec52b856484588a741da264a7e0bd180 (1 x njrat, 1 x Sality) |
| ssdeep | 24576:5wn0a4mZ4Nj9KRpRoUWmmKKR+Pz3VZcwZ60PX0wS7fLIonJwDl7:5wn7VSNj4fWm/KUPDVZnZfPtEL7c7 |
| Threatray | 65 similar samples on MalwareBazaar |
| TLSH | T1E3251242B54081F1F4107532E95D27A79A317C3AAB50A11B63B0BF6D3DF02626E1BF6B |
| TrID | 90.5% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39) 3.5% (.EXE) Win64 Executable (generic) (10522/11/4) 2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 1.5% (.EXE) Win32 Executable (generic) (4504/4/1) 0.6% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| dhash icon | b030e09cd8c9d899 (1 x Sality) |
| Reporter | |
| Tags: | exe Sality |
Intelligence
File Origin
CAVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Malware Config
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Unpacked files
d69e20f3df6a35c1e51faef8fca17243fbee2c86d085aaeca466041af0d52c95
4ee41060b8f1c5679b10bebb8378f353ea62eb38ab27f041e3727dd8cb06b19d
f3dda8f48606c448d22a7b407f61757605acc028d3deddd0ad8c1e2742efcf86
39a77ef363317beea8cad0c8dfe80791ee12647f61396cbfa0128b73113bab8d
1a01e198f114dda369db7002b3ab6689c015405ed3837b458eb914eb48b0be45
537b10cf8e13513c59002c768458b911fb39b95a9d5d7cf28455577b26f86af3
eb88869b7f1bc3f33bb3cd56d6cf4d81fbb0beb590cb9678cc1acf3206f3056f
11df6b403ee5a2e308eff2382fe7ec896a087d14bbee47ed8a02c0a4d940bccf
40f6ef54f565857eedc2823d556b6e48f446526b2f8e490f473d79c5b8534849
50d803405e13a8749bbbc53185cc4e3d104ab2dd1d85e3c4c375a95697908ba1
48029d524b58b030cbe0e7dfed75a17aab0f68a316b26bf3f99f59a3f94cb248
db7d41592820a1b25476bdc4abcde914f4be174429866e26af9aed84a71f10e3
a4ef531f35ec95d7ea3310eb9a2ded322d2cdbf57eabe96aa491b8202a420c24
69735cd8499cfbf56dab45602c168d9ce3bec18f106935f17b311c0b17e5ec37
497fa678528f8dc7dfaebe76f73061581f621d5eb2ed06e0c8b937a9131e9191
aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058
30a9291c7713404a55cc3025689f8305aaf31fb9492a5612841b80f1d2aa45ad
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_EXE_Packed_SimplePolyEngine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.DLL::SetFileSecurityA |
| COM_BASE_API | Can Download & Execute components | OLE32.DLL::CoCreateInstance OLE32.DLL::CreateStreamOnHGlobal |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.DLL::AdjustTokenPrivileges ADVAPI32.DLL::SetFileSecurityW |
| SHELL_API | Manipulates System Shell | SHELL32.DLL::ShellExecuteExA SHELL32.DLL::SHFileOperationA SHELL32.DLL::SHGetFileInfoA |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.DLL::OpenProcessToken KERNEL32.DLL::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::LoadLibraryA KERNEL32.DLL::GetCommandLineA |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.DLL::CreateDirectoryA KERNEL32.DLL::CreateDirectoryW KERNEL32.DLL::CreateFileA KERNEL32.DLL::CreateFileW KERNEL32.DLL::DeleteFileA KERNEL32.DLL::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | ADVAPI32.DLL::LookupPrivilegeValueA |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.DLL::RegCreateKeyExA ADVAPI32.DLL::RegOpenKeyExA ADVAPI32.DLL::RegQueryValueExA ADVAPI32.DLL::RegSetValueExA |
| WIN_USER_API | Performs GUI Actions | USER32.DLL::FindWindowExA USER32.DLL::PeekMessageA USER32.DLL::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.