MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 db7d41592820a1b25476bdc4abcde914f4be174429866e26af9aed84a71f10e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sality


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: db7d41592820a1b25476bdc4abcde914f4be174429866e26af9aed84a71f10e3
SHA3-384 hash: 702e966c4a86c0252841bcf470b3f4ebf9e0a1d1532d7c6173c09139d19be9ccc6afb2d807b4f57c9047f5e739f2f273
SHA1 hash: d166f23e50755564758d7d61b2a0099e336223c9
MD5 hash: ec56b4113b8e31c689f523ecd91a7df2
humanhash: orange-saturn-zebra-blossom
File name:942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exe
Download: download sample
Signature Sality
File size:319'488 bytes
First seen:2024-07-24 19:11:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9a20ff85dacf720a590fdfc798c3f29f (1 x Sality)
ssdeep 6144:d5g86iHCj0yQ2dz5sv5jOCCunMUq0226yqOQApgyAGm34HCCk:d+8PHCj0yQ2dz5KHC6MUq0XQ8ATU
TLSH T192649D21B6E084B7D59E10304DE66B79A2B5FC058B309BBB2354FF1D2E369815D3236E
TrID 32.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
17.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
13.7% (.SCR) Windows screen saver (13097/50/3)
11.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon 486460f030e8f030 (1 x Sality)
Reporter Anonymous
Tags:exe Sality


Avatar
Anonymous
this malware sample is very nasty!

Intelligence


File Origin
# of uploads :
1
# of downloads :
317
Origin country :
CN CN
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
Execution Generic Network Stealth
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a process from a recently created file
Changing an executable file
Creating a window
Сreating synchronization primitives
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Searching for synchronization primitives
Launching a process
Creating a file
Modifying an executable file
Enabling the 'hidden' option for recently created files
Blocking the Windows Security Center notifications
Query of malicious DNS domain
Blocking the User Account Control
Firewall traversal
Unauthorized injection to a system process
Unauthorized injection to a recently created process
Creating a file in the mass storage device
Infecting executable files
Enabling a "Do not show hidden files" option
Enabling autorun with system ini files
Unauthorized injection to a browser process
Enabling threat expansion on mass storage devices
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger lolbin microsoft_visual_cc packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Bdaejec, Sality
Detection:
malicious
Classification:
spre.troj.evad
Score:
88 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject threads in other processes
Creates autorun.inf (USB autostart)
Deletes keys which are related to windows safe boot (disables safe mode boot)
Detected unpacking (changes PE section rights)
Disables UAC (registry)
Disables user account control notifications
Drops PE files with a suspicious file extension
Found stalling execution ending in API Sleep call
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May modify the system service descriptor table (often done to hook functions)
Modifies the windows firewall
Modifies the windows firewall notifications settings
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Bdaejec
Yara detected Sality
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480622 Sample: 942b266052cbd8e8b460173ab63... Startdate: 24/07/2024 Architecture: WINDOWS Score: 88 40 www.ledyazilim.com 2->40 42 ksandrafashion.com 2->42 44 2 other IPs or domains 2->44 54 Malicious sample detected (through community Yara rule) 2->54 56 Antivirus detection for URL or domain 2->56 58 Antivirus detection for dropped file 2->58 60 9 other signatures 2->60 8 942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exe 81 11 2->8         started        signatures3 process4 dnsIp5 46 85.17.167.196, 9832 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 8->46 48 ksandrafashion.com 46.8.8.100, 49702, 80 GRANSYGransysrohttpgransycomCZ Russian Federation 8->48 50 www.ledyazilim.com 94.138.197.70, 49701, 80 AS49126TR Turkey 8->50 26 C:\ugbiqp.pif, PE32 8->26 dropped 28 C:\Users\user\AppData\Local\...\winsoeuxe.exe, PE32 8->28 dropped 30 C:\Users\user\AppData\Local\Temp\QhXxTO.exe, PE32 8->30 dropped 32 C:\autorun.inf, Microsoft 8->32 dropped 62 Creates autorun.inf (USB autostart) 8->62 64 Changes security center settings (notifications, updates, antivirus, firewall) 8->64 66 Found stalling execution ending in API Sleep call 8->66 68 10 other signatures 8->68 13 QhXxTO.exe 18 8->13         started        18 fontdrvhost.exe 8->18 injected 20 fontdrvhost.exe 8->20 injected 22 dwm.exe 8->22 injected file6 signatures7 process8 dnsIp9 52 ddos.dnsnb8.net 44.221.84.105, 49703, 49704, 49705 AMAZON-AESUS United States 13->52 34 C:\Program Files\7-Zip\Uninstall.exe, PE32 13->34 dropped 36 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 13->36 dropped 38 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 13->38 dropped 70 Antivirus detection for dropped file 13->70 72 Detected unpacking (changes PE section rights) 13->72 74 Machine Learning detection for dropped file 13->74 76 Infects executable files (exe, dll, sys, html) 13->76 24 WerFault.exe 21 16 13->24         started        file10 signatures11 process12
Threat name:
Win32.Virus.Jadtre
Status:
Malicious
First seen:
2024-07-24 19:12:13 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
36 of 38 (94.74%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:sality aspackv2 backdoor discovery evasion trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Checks whether UAC is enabled
Enumerates connected drives
ASPack v2.12-2.42
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
UPX packed file
Windows security modification
Modifies firewall policy service
Sality
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
e7c75e5d82ed1b7ce28d95af74700fe0fac95b0903141d72aaf3b0f8a84c244a
MD5 hash:
b31b77af9cf615c2f1d42d7255562937
SHA1 hash:
887b332f6051cbae0e396610657398f9ffde6e04
Detections:
Sality_Malware_Oct16
SH256 hash:
2e4e816f5839e007149a8987d871776a64b5eeea9a3df7f71b0db12b9ed8d517
MD5 hash:
57cde8ddd4261277272a6151855f8966
SHA1 hash:
9afc39cfad97a3ce12949b65c05f438025fdbac2
Detections:
sality win_sality_g0 win_sality_auto INDICATOR_EXE_Packed_SimplePolyEngine Sality_Malware_Oct16
SH256 hash:
d34b4e7472d1df3603be48d10c4a267281bc3d39ea64c424de408f0876a3035a
MD5 hash:
31de33a273cf87952e94d3534335a9b1
SHA1 hash:
4df636d4de33d549a3a6e27ca75e8eb60e77c77a
SH256 hash:
15edb473b124334f22667227e50c610b8d93e518136f9803db062b90778b7fce
MD5 hash:
492ab447c0dc93565cd0c91f9fe9ff32
SHA1 hash:
93cedba4217cd37b1fd20505074a620f68b9fe72
Detections:
win_unidentified_045_auto win_unidentified_045_g0
SH256 hash:
db7d41592820a1b25476bdc4abcde914f4be174429866e26af9aed84a71f10e3
MD5 hash:
ec56b4113b8e31c689f523ecd91a7df2
SHA1 hash:
d166f23e50755564758d7d61b2a0099e336223c9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Sality

Executable exe db7d41592820a1b25476bdc4abcde914f4be174429866e26af9aed84a71f10e3

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetVolumeInformationA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::SetStdHandle
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::GetFileAttributesA
KERNEL32.dll::FindFirstFileA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegDeleteKeyA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuA
USER32.dll::FindWindowA
USER32.dll::PeekMessageA
USER32.dll::CreateWindowExA

Comments