Overview
overview
3Static
static
3Bunifu_UI_v1.5.3.dll
windows7-x64
1Bunifu_UI_v1.5.3.dll
windows10-2004-x64
1UTransfer.dll
windows7-x64
3UTransfer.dll
windows10-2004-x64
3UTransfer64.exe
windows7-x64
1UTransfer64.exe
windows10-2004-x64
1Vip ByPass....8.exe
windows7-x64
3Vip ByPass....8.exe
windows10-2004-x64
3General
-
Target
58853a87af0e7dcc20f1527b6c879987_JaffaCakes118
-
Size
1.5MB
-
Sample
240718-wvhcaazgpl
-
MD5
58853a87af0e7dcc20f1527b6c879987
-
SHA1
e252fb2c51f73399b8b6d45151834074fe57bb82
-
SHA256
4e5bf68a278441f5fd3ba19865b6ecc45563588226199b0cb8b54590885af239
-
SHA512
86d04eb9527d681c9de227e6223f82a3512a507bbfbc5fad916a881b942575ef5e1bd25dc9fbc5b237d688575ffb8b886702e161994b320585255f12b7ddc13e
-
SSDEEP
24576:Ef/1kD8mLkDtd2p6UV6yy1Q5OPo30F5pP6EsiM71tcifX/EzLyGy9yD6dqFOx:Ef/1TZRd2pNe1COqe57Q5iFygbFOx
Static task
static1
Behavioral task
behavioral1
Sample
Bunifu_UI_v1.5.3.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
UTransfer.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
UTransfer.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
UTransfer64.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
UTransfer64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Vip ByPass By MokkaV1.8.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Vip ByPass By MokkaV1.8.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Bunifu_UI_v1.5.3.dll
-
Size
236KB
-
MD5
2ecb51ab00c5f340380ecf849291dbcf
-
SHA1
1a4dffbce2a4ce65495ed79eab42a4da3b660931
-
SHA256
f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
-
SHA512
e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
SSDEEP
6144:SIQpxILDXGGMO7Ice9C5kQw2hWHcHTykhb:SIQpxILDXGGlET9n/cHG
Score1/10 -
-
-
Target
UTransfer.dll
-
Size
108KB
-
MD5
2c7bec32230947e32089869d727e26ab
-
SHA1
59135e6362c18093dc1f773be0d4d1731c2a4872
-
SHA256
f3d75323a2ffdaf4c20cbc9d5bb2578b858448a2f45db99bb26fffc61c8bafc7
-
SHA512
41121e0bb66e3ae42a1cd023a4e094174d4091ba8cf3f0d92fd1d2a1512b8d975943d659669067cabef9ff72fcd6e4999b444af069ac0a06eb7157db9b49085e
-
SSDEEP
1536:TpCxybY0FS6MqS6WvgD9xj03TabrFvY5J6sCGtZaHEUfl:Tpo0k6ZWVTaif6sCGqHV
Score3/10 -
-
-
Target
UTransfer64.dll
-
Size
800KB
-
MD5
9b70cede55fadca6459612ddb4f32a71
-
SHA1
24122dc807159220e25afeb874d0121afc9d091d
-
SHA256
4652fc383f003db5735e0738627c37f14b0a854f7ca916f210cb9dee0a0c456d
-
SHA512
e29437123a5579c1173fd07d0a1330ac5ae8fa49131451698ec648152e435f21bb5a409a4adcc703c0f180c8b90628c64d687340aa2f6cf9a8e8e55afb77e8e0
-
SSDEEP
12288:j5KIVNAIOlVvllPhcjpGsv6cViTIlZThJCmG11RuMYRO2fJpUGpdmTfFnIY:j5KYALlvlPyjpGo6cMTI7bqYaTfFnIY
Score1/10 -
-
-
Target
Vip ByPass By MokkaV1.8.exe
-
Size
1.5MB
-
MD5
fc8f4bf2fb57d8dca20958c9c6c6513d
-
SHA1
725c935b66b847d42efb3bada52a12aa42eff7fb
-
SHA256
527436ae238c3140f666c7890eb09d3c350374c0ad9245b78ca0f8f91a688b0c
-
SHA512
595d415088449380bbe2e147893608c6718e49d3d5693f1aa3f5bfd9b66e03d406a892d43eb5349eb167d8cf558045616fa3f7bb8f6483be15a7e9fb78d29bb7
-
SSDEEP
24576:rjoiNw651TYnz11fds37yCtmxGJjRfysyFlBtBQaIolt7L:fo63C5RdGysmYJdyn/fQaIG7
Score3/10 -