MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48029d524b58b030cbe0e7dfed75a17aab0f68a316b26bf3f99f59a3f94cb248. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sality


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 48029d524b58b030cbe0e7dfed75a17aab0f68a316b26bf3f99f59a3f94cb248
SHA3-384 hash: 74d61508aa74c38933bf9633ee65a913dbe6a697de9e72920ae7b8efd13c845f65c62c4b1507987e4170e9a09b8dfda8
SHA1 hash: c72d42b1a3c9782391b1a378c6cb69cbe780b759
MD5 hash: 485b03863fec97cbe194626f536bf19a
humanhash: black-friend-georgia-stairway
File name:48029D524B58B030CBE0E7DFED75A17AAB0F68A316B26BF3F99F59A3F94CB248.exe
Download: download sample
Signature Sality
File size:103'143 bytes
First seen:2024-07-24 13:48:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 14610dd0ebbc796a9a3a2ba2cdd24e79 (10 x Sality)
ssdeep 1536:3mTtpPbQKYPDWyx+Bvy6/JHBbcH+Dszyhl4q95KfubezDKVHUEVOn2br/EwOB0uA:38t6Ka6y+yGJhIeDuq9M3z7nE/zm93i
Threatray 12 similar samples on MalwareBazaar
TLSH T128A31246645CE52BD71A10F309BE3228DFB49A9E46BB5BEE34BE00ABC05FC57251043E
Reporter Anonymous
Tags:exe Sality


Avatar
Anonymous
this malware sample is very nasty!

Intelligence


File Origin
# of uploads :
1
# of downloads :
326
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Generic Spreading Stealth Sality
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Launching a process
Creating a file
Changing a file
Changing an executable file
Creating a file in the %temp% directory
Enabling the 'hidden' option for recently created files
Blocking the Windows Security Center notifications
Blocking the User Account Control
Firewall traversal
Unauthorized injection to a system process
Creating a file in the mass storage device
Enabling a "Do not show hidden files" option
Enabling autorun with system ini files
Unauthorized injection to a browser process
Infecting executable files
Enabling threat expansion on mass storage devices
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lordpe obfuscated overlay packed packed sality
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
ChromePolish
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject threads in other processes
Deletes keys which are related to windows safe boot (disables safe mode boot)
Disables UAC (registry)
Disables user account control notifications
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May modify the system service descriptor table (often done to hook functions)
Modifies the windows firewall
Modifies the windows firewall notifications settings
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Writes to foreign memory regions
Yara detected Sality
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Sality
Status:
Malicious
First seen:
2024-07-07 06:49:33 UTC
File Type:
PE (Exe)
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:sality backdoor discovery evasion trojan upx
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops autorun.inf file
Checks whether UAC is enabled
Enumerates connected drives
UPX packed file
Windows security modification
Modifies firewall policy service
Sality
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Unpacked files
SH256 hash:
2e4e816f5839e007149a8987d871776a64b5eeea9a3df7f71b0db12b9ed8d517
MD5 hash:
57cde8ddd4261277272a6151855f8966
SHA1 hash:
9afc39cfad97a3ce12949b65c05f438025fdbac2
Detections:
sality win_sality_g0 win_sality_auto INDICATOR_EXE_Packed_SimplePolyEngine Sality_Malware_Oct16
SH256 hash:
d34b4e7472d1df3603be48d10c4a267281bc3d39ea64c424de408f0876a3035a
MD5 hash:
31de33a273cf87952e94d3534335a9b1
SHA1 hash:
4df636d4de33d549a3a6e27ca75e8eb60e77c77a
SH256 hash:
79b413acf5cd1bcef3499d8088e8d55b3ea4b0772699e0b9cbd936d556bc69ef
MD5 hash:
1c95d9be7a2b12289e10163f4c76ef13
SHA1 hash:
8352c983f75b7a1289e5298b745757b9a8449c96
Detections:
win_sality_auto Sality_Malware_Oct16
SH256 hash:
48029d524b58b030cbe0e7dfed75a17aab0f68a316b26bf3f99f59a3f94cb248
MD5 hash:
485b03863fec97cbe194626f536bf19a
SHA1 hash:
c72d42b1a3c9782391b1a378c6cb69cbe780b759
Detections:
Sality_Malware_Oct16
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SimplePolyEngine
Author:ditekSHen
Description:Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Sality_Malware_Oct16
Author:Florian Roth (Nextron Systems)
Description:Detects an unspecififed malware - October 2016
Reference:Internal Research
Rule name:Sality_Malware_Oct16_RID2E9B
Author:Florian Roth
Description:Detects an unspecififed malware - October 2016
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Sality

Executable exe 48029d524b58b030cbe0e7dfed75a17aab0f68a316b26bf3f99f59a3f94cb248

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments