Malware Analysis Report

2025-06-15 22:33

Sample ID 241109-xyt1xszhlk
Target 27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca
SHA256 27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca
Tags
healer redline murka discovery dropper evasion infostealer persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca

Threat Level: Known bad

The file 27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca was found to be: Known bad.

Malicious Activity Summary

healer redline murka discovery dropper evasion infostealer persistence trojan

Healer

RedLine

Healer family

Redline family

Modifies Windows Defender Real-time Protection settings

RedLine payload

Detects Healer an antivirus disabler dropper

Windows security modification

Executes dropped EXE

Adds Run key to start application

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 19:16

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 19:16

Reported

2024-11-09 19:18

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe"

Signatures

Detects Healer an antivirus disabler dropper

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Healer

dropper healer

Healer family

healer

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2920 wrote to memory of 4712 N/A C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe
PID 2920 wrote to memory of 4712 N/A C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe
PID 2920 wrote to memory of 4712 N/A C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe
PID 4712 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe
PID 4712 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe
PID 4712 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe
PID 4712 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe
PID 4712 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe
PID 4712 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe

Processes

C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe

"C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
CY 217.196.96.101:4132 tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
CY 217.196.96.101:4132 tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
CY 217.196.96.101:4132 tcp
CY 217.196.96.101:4132 tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
CY 217.196.96.101:4132 tcp
CY 217.196.96.101:4132 tcp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe

MD5 fee75afe7ae5e52c69896233b4253eef
SHA1 f9c74f84ceef0b467d91018db4261dd0f35a98a7
SHA256 86a2465e3b850731242d53feeadfbf775a16daa46d5d1b59ad86c452dfa4295a
SHA512 155e899e579676e9ac4ed70f048cf61caf042ddd409fa11d14141c982b12a4a6a1b2a91b5469fa838b9093c70edb93a2c97dda6d8adb2de42c50f6e9975a9e9c

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe

MD5 85fce7e808f9f4d0cace7537f3990d8a
SHA1 5c0a66e370e473beca270a60fcb4a64e7c7af483
SHA256 c53c6d6b01452a36410b0b5a65419c03700898fb0076981656a7934c0c167ac6
SHA512 0dd8457ff53e99be5deaba6d75f8601595e8fc6f42ca08055daf8bf152c13d9e75328cd676490678bf995f164a7693996e6f12871511e1ffddab686e2a8f8b95

memory/2948-14-0x000000007421E000-0x000000007421F000-memory.dmp

memory/2948-15-0x00000000022B0000-0x00000000022CA000-memory.dmp

memory/2948-17-0x00000000049A0000-0x0000000004F44000-memory.dmp

memory/2948-16-0x0000000074210000-0x00000000749C0000-memory.dmp

memory/2948-19-0x0000000074210000-0x00000000749C0000-memory.dmp

memory/2948-18-0x00000000024B0000-0x00000000024C8000-memory.dmp

memory/2948-20-0x0000000074210000-0x00000000749C0000-memory.dmp

memory/2948-30-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-38-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-48-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-46-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-44-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-42-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-40-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-36-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-34-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-32-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-28-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-26-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-24-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-21-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-22-0x00000000024B0000-0x00000000024C2000-memory.dmp

memory/2948-49-0x000000007421E000-0x000000007421F000-memory.dmp

memory/2948-50-0x0000000074210000-0x00000000749C0000-memory.dmp

memory/2948-52-0x0000000074210000-0x00000000749C0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe

MD5 91f424ee7e05e87d57a7dcd83e1a9358
SHA1 e45b6e0fc5b51020fb1ddf14121e11c643478b4e
SHA256 d0fb1780f8072834a6d223e44b84c683c7543642bf1ba47cde4c5e9f1690438b
SHA512 d11e231e4a25edc1889e3662cf66651e018424cb30bb37fc5db1b8ed457a4150d5108d38160d4c6b544964232e9f4fd8c9c30fba7281cdc0ebb175fba008f628

memory/2876-56-0x00000000002D0000-0x0000000000300000-memory.dmp

memory/2876-57-0x00000000023D0000-0x00000000023D6000-memory.dmp

memory/2876-58-0x00000000052E0000-0x00000000058F8000-memory.dmp

memory/2876-59-0x0000000004DD0000-0x0000000004EDA000-memory.dmp

memory/2876-60-0x0000000004C40000-0x0000000004C52000-memory.dmp

memory/2876-61-0x0000000004CC0000-0x0000000004CFC000-memory.dmp

memory/2876-62-0x0000000004D00000-0x0000000004D4C000-memory.dmp