Overview
overview
10Static
static
10BearFlix\BearFlix.exe
windows7-x64
9BearFlix\BearFlix.exe
windows10-2004-x64
9BearFlix\data.exe
windows7-x64
1BearFlix\data.exe
windows10-2004-x64
3BearFlix\libcef.exe
windows7-x64
9BearFlix\libcef.exe
windows10-2004-x64
9BearFlix\strip.exe
windows7-x64
9BearFlix\strip.exe
windows10-2004-x64
9BruteFlix ...ed.exe
windows7-x64
9BruteFlix ...ed.exe
windows10-2004-x64
9BruteFlix ...le.dll
windows7-x64
1BruteFlix ...le.dll
windows10-2004-x64
1BruteFlix ...et.dll
windows7-x64
1BruteFlix ...et.dll
windows10-2004-x64
1BruteFlix ...on.dll
windows7-x64
1BruteFlix ...on.dll
windows10-2004-x64
1BruteFlix ...ta.exe
windows7-x64
9BruteFlix ...ta.exe
windows10-2004-x64
9BruteFlix ...ef.exe
windows7-x64
9BruteFlix ...ef.exe
windows10-2004-x64
9BruteFlix ...ec.exe
windows7-x64
1BruteFlix ...ec.exe
windows10-2004-x64
3Dark Star ...32.dll
windows7-x64
3Dark Star ...32.dll
windows10-2004-x64
3Dark Star ...64.dll
windows7-x64
1Dark Star ...64.dll
windows10-2004-x64
1Dark Star ...io.exe
windows7-x64
9Dark Star ...io.exe
windows10-2004-x64
9Dark Star ...al.exe
windows7-x64
3Dark Star ...al.exe
windows10-2004-x64
3Dark Star ...32.exe
windows7-x64
1Dark Star ...32.exe
windows10-2004-x64
3Analysis
-
max time kernel
291s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
BearFlix\BearFlix.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BearFlix\BearFlix.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
BearFlix\data.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BearFlix\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
BearFlix\libcef.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
BearFlix\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
BearFlix\strip.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
BearFlix\strip.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win10v2004-20240730-en
General
-
Target
BearFlix\strip.exe
-
Size
7.1MB
-
MD5
43971e360fe1b457f22b16f5e25d51a2
-
SHA1
ed96672880b32da758d841cb9882037057105290
-
SHA256
c606a1a71374ee7b0fb844c47c448bab0234d9162951f488f07edd5664a88c16
-
SHA512
85b9e91f25f5ded543f05ad2d9265564f3585f0ce86c02f65b3e766c0a17da1b2c427d54500ed6bf23fcb5a75e10ea1f4d1a82db87fb91f7768d0d35a4a9518f
-
SSDEEP
196608:WZDBLzV8ld98BlON2jnbNswvBXvowJgzl7GSZn7ftm:WZD+90jVvBXvoww77rc
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ strip.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion strip.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion strip.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 strip.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral7/memory/2384-1-0x00000000013D0000-0x0000000001AE2000-memory.dmp agile_net -
resource yara_rule behavioral7/files/0x000400000001db27-8.dat themida behavioral7/memory/2384-9-0x0000000070460000-0x0000000070A79000-memory.dmp themida behavioral7/memory/2384-11-0x0000000070460000-0x0000000070A79000-memory.dmp themida behavioral7/memory/2384-10-0x0000000070460000-0x0000000070A79000-memory.dmp themida behavioral7/memory/2384-14-0x0000000070460000-0x0000000070A79000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA strip.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2384 strip.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1496 2384 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language strip.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1496 2384 strip.exe 32 PID 2384 wrote to memory of 1496 2384 strip.exe 32 PID 2384 wrote to memory of 1496 2384 strip.exe 32 PID 2384 wrote to memory of 1496 2384 strip.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\BearFlix\strip.exe"C:\Users\Admin\AppData\Local\Temp\BearFlix\strip.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 6562⤵
- Program crash
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5105e678e6ee84e0fa7fbe34df1f9639c
SHA117e4d775f4405e3a81a793b5bf775e9c95da5af9
SHA2564ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2
SHA5123a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689