MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65d452037fe5b0178ba3d8b1ae2f7b556d5a06f93e1079725637251fca3875cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sality


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 65d452037fe5b0178ba3d8b1ae2f7b556d5a06f93e1079725637251fca3875cd
SHA3-384 hash: 4f8ff884591989dc6eb2daeacd6863c0ded520d01d02f4766c7bf31c33b4e8f7fde41e3de103c16f92e5938c4ccfdb37
SHA1 hash: f16718a110a10ba5dade87c4ec3bd51c0bc2eb5b
MD5 hash: f04527ab6fbe2e2c9def4ea5c400c753
humanhash: texas-video-victor-bakerloo
File name:f04527ab_by_Libranalysis
Download: download sample
Signature Sality
File size:164'352 bytes
First seen:2021-05-05 08:01:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f7abe9aaa48fe0998f125ce28b3559fe (1 x Sality)
ssdeep 3072:xaJW2qohu1mfiXE9oZkabtbonkOG/vT/MIccu+7JRqe2U6a+ItB0oCZCF:oJpEAfi+ovh0nBG3LM23J2UD+auoT
Threatray 14 similar samples on MalwareBazaar
TLSH 51F3121DF974262CE036C13045F5C89498B638595D389F46D2CC297B68EBBF4EA243EB
Reporter Libranalysis
Tags:Sality


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a window
Changing an executable file
Searching for the window
Sending a UDP request
Blocking a possibility to launch for the Windows Task Manager (taskmgr)
Blocking a possibility to launch for the Windows registry editor (regedit.exe)
Blocking the Windows Security Center notifications
Blocking the User Account Control
Firewall traversal
Unauthorized injection to a system process
Enabling a "Do not show hidden files" option
Enabling autorun with system ini files
Unauthorized injection to a browser process
Infecting executable files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Virus.Sality
Status:
Malicious
First seen:
2020-05-06 00:28:29 UTC
AV detection:
30 of 31 (96.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Drops file in Windows directory
Checks whether UAC is enabled
Enumerates connected drives
Windows security modification
Disables RegEdit via registry modification
Disables Task Manager via registry modification
UPX packed file
Modifies firewall policy service
UAC bypass
Windows security bypass
Unpacked files
SH256 hash:
29f5c747112675992b9d89afa3752f257e58e0c6b0cd731ae1389ece2a27eb73
MD5 hash:
6ccfb6b48a886d0e78152fc969090e7a
SHA1 hash:
d3a90f4861047d2834e07e4088f19e97b5474291
SH256 hash:
dc374c1018c16d6993d9b8cc47773cc48e4b59e0452d2580602e4652513e10e1
MD5 hash:
03a8955bab80e5a4b5e3697d2fa1bf31
SHA1 hash:
1cda8b228155200bb595cd705cce88d817cf470c
SH256 hash:
65d452037fe5b0178ba3d8b1ae2f7b556d5a06f93e1079725637251fca3875cd
MD5 hash:
f04527ab6fbe2e2c9def4ea5c400c753
SHA1 hash:
f16718a110a10ba5dade87c4ec3bd51c0bc2eb5b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments