MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sality


Vendor detections: 16


Intelligence 16 IOCs YARA 10 File information Comments

SHA256 hash: aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058
SHA3-384 hash: 7dc18b0a6dc97ecae89a5a5d04b7a547fbb75194f91b73edc32f8fb1174ff994f7b4187b92a9c4511df993cf47ea31f1
SHA1 hash: 6f4ff30172694525205b758af52bf4b64fccde66
MD5 hash: 2239efedcd0afa81d8369fdd1c04ca84
humanhash: king-freddie-friend-alanine
File name:mstsc (2).exe
Download: download sample
Signature Sality
File size:463'872 bytes
First seen:2025-05-02 20:39:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9563dea574f58f47d86577e5a7f024c (1 x Sality)
ssdeep 12288:q2LzVTp0r2iLuqmO5MpODEmrwTnx6Tv0w1:vXm8mrwTx6TvF
TLSH T137A44C27F1618EFBE5921030568B663009A96C7DAFB2CDC716503AAED6357C05E3C78B
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 88acbe9cd4f5a4e0 (1 x njrat, 1 x Sality)
Reporter sswex
Tags:exe Sality

Intelligence


File Origin
# of uploads :
1
# of downloads :
501
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
New folder.rar
Verdict:
Malicious activity
Analysis date:
2025-05-02 20:33:51 UTC
Tags:
arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
autorun sality emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a file
Searching for synchronization primitives
Launching a process
Changing an executable file
Modifying an executable file
Creating a file in the %temp% directory
Enabling the 'hidden' option for recently created files
Blocking the Windows Security Center notifications
Blocking the User Account Control
Firewall traversal
Unauthorized injection to a system process
Creating a file in the mass storage device
Enabling a "Do not show hidden files" option
Enabling autorun with system ini files
Unauthorized injection to a browser process
Infecting executable files
Enabling threat expansion on mass storage devices
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context fingerprint lolbin microsoft_visual_cc overlay packed remote sality virus virut
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject threads in other processes
Creates autorun.inf (USB autostart)
Deletes keys which are related to windows safe boot (disables safe mode boot)
Disables UAC (registry)
Disables user account control notifications
Malicious sample detected (through community Yara rule)
May modify the system service descriptor table (often done to hook functions)
Modifies the windows firewall
Modifies the windows firewall notifications settings
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Writes to foreign memory regions
Yara detected Sality
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Sality
Status:
Malicious
First seen:
2023-07-02 23:18:51 UTC
File Type:
PE (Exe)
Extracted files:
100
AV detection:
34 of 36 (94.44%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:sality backdoor defense_evasion discovery trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
System Location Discovery: System Language Discovery
Drops file in Windows directory
UPX packed file
Checks whether UAC is enabled
Enumerates connected drives
Windows security modification
Modifies firewall policy service
Sality
Sality family
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Verdict:
Malicious
Tags:
Win.Virus.Virut-5898123-1
YARA:
n/a
Unpacked files
SH256 hash:
aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058
MD5 hash:
2239efedcd0afa81d8369fdd1c04ca84
SHA1 hash:
6f4ff30172694525205b758af52bf4b64fccde66
SH256 hash:
d34b4e7472d1df3603be48d10c4a267281bc3d39ea64c424de408f0876a3035a
MD5 hash:
31de33a273cf87952e94d3534335a9b1
SHA1 hash:
4df636d4de33d549a3a6e27ca75e8eb60e77c77a
SH256 hash:
2e4e816f5839e007149a8987d871776a64b5eeea9a3df7f71b0db12b9ed8d517
MD5 hash:
57cde8ddd4261277272a6151855f8966
SHA1 hash:
9afc39cfad97a3ce12949b65c05f438025fdbac2
Detections:
win_sality_auto win_sality_g0 sality Sality_Malware_Oct16 INDICATOR_EXE_Packed_SimplePolyEngine
SH256 hash:
5ecae7ff8207d2ba6d6230e49bb17054117e566c1977d91e65f63c49a9dddc13
MD5 hash:
8f6c7d6e9e2c98fc73226b4438890990
SHA1 hash:
46239ce4a616ae81d2559bbc247cebdbf0796694
Detections:
Sality_Malware_Oct16 INDICATOR_EXE_Packed_SimplePolyEngine
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_SimplePolyEngine
Author:ditekSHen
Description:Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetDiskFreeSpaceA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::SetStdHandle
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileW
KERNEL32.dll::GetFileAttributesA
KERNEL32.dll::GetFileAttributesW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameA
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::GetUserNameA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateMenu
USER32.dll::CreateWindowExA
USER32.dll::CreateWindowExW

Comments