You better have a look at what appears to be a thorough description here:http://www.ca.com/securityadvisor/virusinfo/virus.aspx?ID=52797
It’s all pertinent, what might partly answer your question is this excerpt:
Win32/Sality Family
Date Published:
20 Mar 2006
Last Updated:
23 Mar 2006
Threat Assessment
Overall Risk: Low
Wild: Low
Destructiveness: High
Pervasiveness: Low
Characteristics
Type : Virus
Category : Win32
Also known as: W32.HLLP.Sality (Symantec)
Immediate Protection Info
Tools
Download signature files Download signature files
Scan for viruses Scan for viruses
Submit a Virus Sample Submit a Virus Sample
Description
Method of Infection
Method of Distribution
Payload
Additional Information
Description
Win32/Sality is a polymorphic virus that infects Win32 PE executable files. It also contains trojan components. Win32/Sality has been known to be downloaded by variants of the Win32/Bagle family.
Back to top
Method of Infection
When an infected file is executed the virus decrypts itself and drops a DLL file into the %System% directory. The DLL file is injected into other running processes. The virus then executes the host program code.
Some examples of the names used by the Sality DLL file as reported to CA from the wild include the following:
* %System%\syslib32.dll
* %System%\oledsp32.dll
* %System%\olemdb32.dll
* %System%\wcimgr32.dll
* %System%\wmimgr32.dll
Note: ‘%System%’ is a variable location. The malware determines the location of the current System folder by querying the operating system. The default installation location for the System directory for Windows 2000 and NT is C:\Winnt\System32; for 95,98 and ME is C:\Windows\System; and for XP is C:\Windows\System32.
Many variants of Sality also attempt to infect executable files referenced by values in the following registry keys:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
This enables the virus to run at each Windows start.
Back to top
Method of Distribution
Via File Infection
Sality searches local drives C:\ to Y:\ for Windows PE executable files to infect. Some variants do not infect files with a file size below 4K bytes or above 20M bytes. The virus replaces code at the entry point of the executable with its own code, and appends an encrypted copy of itself to the host file, which increases the size of the infected program. When the file is executed the virus extracts and runs the appended code, and then runs the host program code to hide its presence.
(My bolding).
It is also implicated in the disabling of virus database files, and a fairly good number of AV’s (see the description as linked.)
The list of those processes doesn’t appear to include Avast, but the list is not necessarily complete.
Were you able to quarantine it from the Avast boot scan?