General
-
Target
2bitty_fat_titty.exe
-
Size
4.1MB
-
Sample
240514-wnyexshb3y
-
MD5
422acfc9a899f11e466854d8289a0e58
-
SHA1
14825ff367f16ed234df6fcf542fae9d03544516
-
SHA256
6914bafb7229235aaabad34edb9b9bc88325de3c058c05218c7c10e709d4d587
-
SHA512
914cb29fb7a8fe1f50095a71a3dc24770aa7416f6c1522c5ee260e4a331f17c6903f709bf5555d16e5aa0f3c0808a5f609f9f460d673c51ebc41b3cbe9bc6e5d
-
SSDEEP
98304:/YombAWktvzZUjIMgYxIDySvOWowvslOTAJ+EgEWX:woojjJglmWPslOA+E3WX
Behavioral task
behavioral1
Sample
2bitty_fat_titty.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
2bitty_fat_titty.exe
-
Size
4.1MB
-
MD5
422acfc9a899f11e466854d8289a0e58
-
SHA1
14825ff367f16ed234df6fcf542fae9d03544516
-
SHA256
6914bafb7229235aaabad34edb9b9bc88325de3c058c05218c7c10e709d4d587
-
SHA512
914cb29fb7a8fe1f50095a71a3dc24770aa7416f6c1522c5ee260e4a331f17c6903f709bf5555d16e5aa0f3c0808a5f609f9f460d673c51ebc41b3cbe9bc6e5d
-
SSDEEP
98304:/YombAWktvzZUjIMgYxIDySvOWowvslOTAJ+EgEWX:woojjJglmWPslOA+E3WX
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-