General

  • Target

    Hyper.Log.Extractor.zip

  • Size

    1.4MB

  • MD5

    f7a8da4fdb217dbfde9b32aa4347aa7e

  • SHA1

    216d0ca8bbbfc292ac486fcccaa1a1e4979d893d

  • SHA256

    f092a9a5ff9bf3361744dccc197df3099d9fbef17924157fe6d8b0bb811825bc

  • SHA512

    56768acb83e1c9a0f3de9c73b58c6d80be155bda6db383d12a4a241ab061ac8eba67fa172017957649e97070176587f6fd5cc868e4092b7f0f2d36f4611865f6

  • SSDEEP

    24576:CkW1bBM6eoS47sgE8laSAfDc9/s3+0iZryNdvPq5V4lKoQwiuAq/IP7/D/je6kT1:NEtM6zS4o8laSX92picNd65oKWisQ7/O

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 3 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Hyper.Log.Extractor.zip
    .zip
  • Bunifu.Licensing.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Code Sign

    Headers

    Imports

    Sections

  • Bunifu.UI.WinForms.1.5.3.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Code Sign

    Headers

    Imports

    Sections

  • Bunifu.UI.WinForms.BunifuImageButton.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Code Sign

    Headers

    Imports

    Sections

  • hyperlogextractor.application
  • hyperlogextractor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • hyperlogextractor.exe.config
  • hyperlogextractor.exe.manifest
  • hyperlogextractor.pdb