MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c56936ed9bcb76fe8ee2069618cf3b509fe6cf4c73c1fb53723596077ab1f5fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Healer
Vendor detections: 17
| SHA256 hash: | c56936ed9bcb76fe8ee2069618cf3b509fe6cf4c73c1fb53723596077ab1f5fa |
|---|---|
| SHA3-384 hash: | 79f7bccccb9f7f470efb1e959b33c5845a784ec156fafdb1a6cecd9714523eca460a9cbc2196f91770bad1a343e3cca1 |
| SHA1 hash: | 3c9ef605a454e34dd9a9fd62e9b6708264845bd4 |
| MD5 hash: | d7ac39bafca00876be0923660c93e691 |
| humanhash: | pip-equal-timing-batman |
| File name: | file |
| Download: | download sample |
| Signature | Healer |
| File size: | 1'634'304 bytes |
| First seen: | 2023-10-26 05:03:58 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:CVxCYUkZjoWq8qAE7Gqp+LsIwq5C5SEaJ7:oA1YjV2F7pq5CdaJ7 |
| Threatray | 2'641 similar samples on MalwareBazaar |
| TLSH | T10375238217E18533F7BA53B048FB0347167ABC700EBB42FB568DD1A24E639589972327 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe Healer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
http://195.123.218.98:80
http://31.192.23
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | mal_healer |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | Payload disabling Windows AV |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.