MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69735cd8499cfbf56dab45602c168d9ce3bec18f106935f17b311c0b17e5ec37. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sality


Vendor detections: 17


Intelligence 17 IOCs YARA 3 File information Comments

SHA256 hash: 69735cd8499cfbf56dab45602c168d9ce3bec18f106935f17b311c0b17e5ec37
SHA3-384 hash: 5f906cf5756923f32429d0eb0d23edfe1393f7a84c485e008cda2cf11eeced083fc873db33b4cf824e7ea90df553d5f9
SHA1 hash: fc3b4013217e6312ba35114848805e2db1aba9eb
MD5 hash: bb0592556ef699a649f0c0f7756e3708
humanhash: finch-six-pennsylvania-lactose
File name:bb0592556ef699a649f0c0f7756e3708.exe
Download: download sample
Signature Sality
File size:103'140 bytes
First seen:2024-08-22 03:30:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 14610dd0ebbc796a9a3a2ba2cdd24e79 (10 x Sality)
ssdeep 3072:2LhREnsUESLA3Zcjm9qDIDtcuxFaWhBgjn0:mslLEem9qsOW4D0
Threatray 6 similar samples on MalwareBazaar
TLSH T1C4A3124396C185FFD8A96234AB2B8E0E3D7C640FC3C12B6B4D99257C9C4A758BDB0D46
Reporter camman18yt
Tags:exe Sality

Intelligence


File Origin
# of uploads :
1
# of downloads :
416
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
bb0592556ef699a649f0c0f7756e3708.exe
Verdict:
Malicious activity
Analysis date:
2024-08-22 03:31:16 UTC
Tags:
sality upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Generic Spreading Stealth Sality
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file
Launching a process
Searching for synchronization primitives
Creating a window
Changing a file
Changing an executable file
Modifying an executable file
Creating a file in the %temp% directory
Enabling the 'hidden' option for recently created files
Blocking the Windows Security Center notifications
Blocking the User Account Control
Firewall traversal
Unauthorized injection to a system process
Creating a file in the mass storage device
Enabling a "Do not show hidden files" option
Enabling autorun with system ini files
Unauthorized injection to a browser process
Infecting executable files
Enabling threat expansion on mass storage devices
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Virus.Sality
Status:
Malicious
First seen:
2018-03-31 19:43:31 UTC
File Type:
PE (Exe)
AV detection:
38 of 38 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:sality backdoor discovery evasion trojan upx
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops autorun.inf file
Checks whether UAC is enabled
Enumerates connected drives
UPX packed file
Windows security modification
Modifies firewall policy service
Sality
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
954a423f2e18deac85e3662e0301d7652169ac16f044c3175e64b7ec1b88949d
MD5 hash:
53f2c1fb268cc1e2fc8c95e088ccd552
SHA1 hash:
d884955e585e6d71a2a4c80f7c52f670a659da51
Detections:
Sality_Malware_Oct16
SH256 hash:
2e4e816f5839e007149a8987d871776a64b5eeea9a3df7f71b0db12b9ed8d517
MD5 hash:
57cde8ddd4261277272a6151855f8966
SHA1 hash:
9afc39cfad97a3ce12949b65c05f438025fdbac2
Detections:
sality win_sality_g0 win_sality_auto INDICATOR_EXE_Packed_SimplePolyEngine Sality_Malware_Oct16
SH256 hash:
d34b4e7472d1df3603be48d10c4a267281bc3d39ea64c424de408f0876a3035a
MD5 hash:
31de33a273cf87952e94d3534335a9b1
SHA1 hash:
4df636d4de33d549a3a6e27ca75e8eb60e77c77a
SH256 hash:
cbd3dae45feb6c566c7832bff5cf7129bafc267f1b09797acd70b84bfc7578fc
MD5 hash:
00542391f28debdf45362fb100d294d0
SHA1 hash:
6311f79d2c9dd450c935e080298dd7dada8f0fe7
Detections:
win_sality_auto Sality_Malware_Oct16
SH256 hash:
69735cd8499cfbf56dab45602c168d9ce3bec18f106935f17b311c0b17e5ec37
MD5 hash:
bb0592556ef699a649f0c0f7756e3708
SHA1 hash:
fc3b4013217e6312ba35114848805e2db1aba9eb
Detections:
Sality_Malware_Oct16
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SimplePolyEngine
Author:ditekSHen
Description:Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
Rule name:Sality_Malware_Oct16
Author:Florian Roth (Nextron Systems)
Description:Detects an unspecififed malware - October 2016
Reference:Internal Research
Rule name:Sality_Malware_Oct16_RID2E9B
Author:Florian Roth
Description:Detects an unspecififed malware - October 2016
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments