General

  • Target

    2bitty_fat_titty.exe

  • Size

    4.1MB

  • Sample

    240514-wnyexshb3y

  • MD5

    422acfc9a899f11e466854d8289a0e58

  • SHA1

    14825ff367f16ed234df6fcf542fae9d03544516

  • SHA256

    6914bafb7229235aaabad34edb9b9bc88325de3c058c05218c7c10e709d4d587

  • SHA512

    914cb29fb7a8fe1f50095a71a3dc24770aa7416f6c1522c5ee260e4a331f17c6903f709bf5555d16e5aa0f3c0808a5f609f9f460d673c51ebc41b3cbe9bc6e5d

  • SSDEEP

    98304:/YombAWktvzZUjIMgYxIDySvOWowvslOTAJ+EgEWX:woojjJglmWPslOA+E3WX

Malware Config

Targets

    • Target

      2bitty_fat_titty.exe

    • Size

      4.1MB

    • MD5

      422acfc9a899f11e466854d8289a0e58

    • SHA1

      14825ff367f16ed234df6fcf542fae9d03544516

    • SHA256

      6914bafb7229235aaabad34edb9b9bc88325de3c058c05218c7c10e709d4d587

    • SHA512

      914cb29fb7a8fe1f50095a71a3dc24770aa7416f6c1522c5ee260e4a331f17c6903f709bf5555d16e5aa0f3c0808a5f609f9f460d673c51ebc41b3cbe9bc6e5d

    • SSDEEP

      98304:/YombAWktvzZUjIMgYxIDySvOWowvslOTAJ+EgEWX:woojjJglmWPslOA+E3WX

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks