General

  • Target

    Debug.zip

  • Size

    1.9MB

  • MD5

    204c9de9f7e3d84c05c5f837b526073f

  • SHA1

    6fcd16a566b77ee36f4e5c06a9ed0b2266a91747

  • SHA256

    cf8996f8e00a3acd60e7bcd246c448ddf895392284d26156179c60046b163e43

  • SHA512

    f3aa6f3777cdb885fa41533742f4e6314583c104396c183bd51693a3ffeb3ddce7c205cc80150bf161bf4ed98aab2546f906f95409356df5b40092824f92f07b

  • SSDEEP

    49152:YrfV1Wg2ML9lJMTzGb0ZTe00P9VS1v6rHgA9eBYIvoJDyA/y3Mew/:YrfV1WIL9fB0Zr0Pix6DUuz/ycew/

Score
3/10

Malware Config

Signatures

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • Debug.zip
    .zip
  • Debug/Bunifu.UI.WinForms.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • Debug/bin/api/CeleryIn.bin
    .dll windows:6 windows x64 arch:x64

    57127fa98e84d836ff1e07fcec0c9958


    Headers

    Imports

    Exports

    Sections

  • Debug/bin/api/CeleryInject.exe
    .exe windows:6 windows x64 arch:x64

    314d948163c00dd9f09575a84339c9a6


    Headers

    Imports

    Sections

  • Debug/ccapi.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • Debug/pika executor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections