General

  • Target

    JoonyV2LastestPremium(1).zip

  • Size

    1.3MB

  • MD5

    ebf39620a2cc42a6948fcdb656a10394

  • SHA1

    d1a777b6c4fdfaf58e7c90f85c25d64c41375701

  • SHA256

    c7aa8d2ae9ccdfb2c0d76d1ba6d87dc2134713deadb84a6882e5d6723427261b

  • SHA512

    855b55c7b5bdd7b19c20627b6ef3342a3216a8c825d0e33cdc21555603224f0fe83558401c538ea2ff4af232136511876c97a6d8242b3a088cbb3c3849e0f593

  • SSDEEP

    24576:NBV2aWDK0p+Aq+1cSSVNbXFUnjoS/X9+4XZKCNKFTV2aWDK0p+AGSSVNbXFUnjoD:NBVfW7pB1ctakct3KzTVfW7pctakWg

Score
3/10

Malware Config

Signatures

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • JoonyV2LastestPremium(1).zip
    .zip
  • JoonyV2/Joonyv2.py
  • JoonyV2/RUN ME FIRST.bat
  • JoonyV2/assets/Joony_logo.png
    .png
  • JoonyV2/assets/discord.png
    .png
  • JoonyV2/assets/key.png
    .png
  • JoonyV2/assets/otter.png
    .png
  • JoonyV2/backend/auth.py
  • JoonyV2/backend/backendutils.py
  • JoonyV2/backend/checker_task.py
  • JoonyV2/backend/choose.py
  • JoonyV2/backend/efi.py
  • JoonyV2/backend/loader_assist.py
  • JoonyV2/backend/macspoof.py
  • JoonyV2/backend/network_unflag.py
  • JoonyV2/backend/pyarmor_runtime_004541/__init__.py
  • JoonyV2/backend/pyarmor_runtime_004541/pyarmor_runtime.pyd
    .dll windows:4 windows x64 arch:x64

    44e184920399a8d878fd36078912fe2c


    Headers

    Imports

    Exports

    Sections

  • JoonyV2/backend/security.py
  • JoonyV2/backend/seeding.py
  • JoonyV2/download_modules.py
  • JoonyV2/keyauth.py
  • JoonyV2/logo.png
    .png
  • JoonyV2/pyarmor_runtime_004541/__init__.py
  • JoonyV2/pyarmor_runtime_004541/pyarmor_runtime.pyd
    .dll windows:4 windows x64 arch:x64

    44e184920399a8d878fd36078912fe2c


    Headers

    Imports

    Exports

    Sections