MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1e6f19a68d81013710285bdd05d864100f9c81510c3141861035d7f4e53dc81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sality


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: e1e6f19a68d81013710285bdd05d864100f9c81510c3141861035d7f4e53dc81
SHA3-384 hash: b0c82f21c79c50d8618939a2e7314471ea172c8b0214c8cb42342b317375cd8f99c78a8ca186df7a55afb10710bd388c
SHA1 hash: c25e0a4190bf557ed60d8096433c8e4b1e21ad6f
MD5 hash: d131ce17f4198371529332376506c894
humanhash: three-alabama-xray-ack
File name:d131ce17_by_Libranalysis
Download: download sample
Signature Sality
File size:241'664 bytes
First seen:2021-05-05 09:07:57 UTC
Last seen:2021-05-05 10:05:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 85d32bc8854621417974d372601908d5 (1 x Sality)
ssdeep 3072:gZEwMzhuL1+90QOalOjUhjzlAj1xtcv/Dogq+EHAn6Zfl6OiGQaXbIl1pkq0t8/G:aZ+OQV5ZzWJYX/qiQ9n7Xbg1p1t/j
Threatray 15 similar samples on MalwareBazaar
TLSH 0E349D0232F3C5B1DEE4D231C8ED5B759639FC954B72BAD79304FA690A32A91D137282
Reporter Libranalysis
Tags:Sality


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
2
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Launching a process
Creating a window
Changing an executable file
Modifying an executable file
Creating a file in the %temp% directory
Deleting a recently created file
Creating a file
Enabling the 'hidden' option for recently created files
Blocking a possibility to launch for the Windows Task Manager (taskmgr)
Blocking a possibility to launch for the Windows registry editor (regedit.exe)
Blocking the Windows Security Center notifications
Blocking the User Account Control
Firewall traversal
Unauthorized injection to a system process
Creating a file in the mass storage device
Enabling a "Do not show hidden files" option
Enabling autorun with system ini files
Unauthorized injection to a browser process
Infecting executable files
Enabling threat expansion on mass storage devices by creating the autorun.inf autorun file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject threads in other processes
Deletes keys which are related to windows safe boot (disables safe mode boot)
Disables the Windows registry editor (regedit)
Disables the Windows task manager (taskmgr)
Disables user account control notifications
Machine Learning detection for sample
May modify the system service descriptor table (often done to hook functions)
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Suspicious Svchost Process
Writes to foreign memory regions
Yara detected Sality
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Sality
Status:
Malicious
First seen:
2020-05-06 00:35:01 UTC
AV detection:
30 of 31 (96.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Drops file in Windows directory
Checks whether UAC is enabled
Enumerates connected drives
Windows security modification
Disables RegEdit via registry modification
Disables Task Manager via registry modification
UPX packed file
Modifies firewall policy service
UAC bypass
Windows security bypass
Unpacked files
SH256 hash:
e1e6f19a68d81013710285bdd05d864100f9c81510c3141861035d7f4e53dc81
MD5 hash:
d131ce17f4198371529332376506c894
SHA1 hash:
c25e0a4190bf557ed60d8096433c8e4b1e21ad6f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_sality_g0
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de
Description:2013-11-11 Sality Infector

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments