Virus:W32/Sality.AA is an appending file infector virus that uses an entry point obscuring technique to hide its presence on the system.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note You need administrative rights to change the settings.
The virus attempts to terminate running antivirus programs. It can also download and install additional malware on the system.
The following file may be dropped on the system:
The file is detected as Virus.Win32.Sality.ab.
It will copy itself to removable drives and shared folders as one of the following :
An autorun.inf file will be created on the drive so that the malware will be executed when it is connected to a computer. It also modifies %windir%\SYSTEM.INI by adding the following section :
Once on the system, the virus searches the hard disk (starting with C:\) and infects any files with the following extensions:
It also infects files with .EXE extensions that are referenced as data in the following registry keys:
The virus appends itself by creating a new 73728 bytes sized section named "[random characters]data". The section contains Sality.AA's obfuscated code.
On infection, the first 327 bytes from the file's entry point are overwritten with deobfuscation code. If the user executes the infected file, Sality.AA restores the original entry point code and launches the program in order to mask its presence.
When run, Sality.AA creates a mutex to ensure only one instance is running. It then modifies a large range of registry entries. The virus attempts to disable processes and services containing strings related to major antivirus software.
The malware connects to the following website to verify an Internet connection :
The malware may connect to the following sites to download and execute additional malware :
Downloaded files are encrypted. They are unencrypted by the malware to the %temp% folder and executed.
The following URLs may possibly be used to get further instructions:
Creates these mutexes:
Sets these values: