Bunk-bed.7z
: The shortcut runs the legitimate executable, which unknowingly loads the malicious DLL ( DLL Sideloading ). This DLL then decrypts and runs the final payload in memory to avoid detection by traditional antivirus. Associated Malware Families
: The .7z archive is often delivered via phishing emails or hosted on fraudulent websites disguised as legitimate software or documents. Bunk-Bed.7z
: The archive usually contains three main components: : The shortcut runs the legitimate executable, which
"Bunk-Bed.7z" is a known malicious archive file associated with , specifically those using "LNK" (Windows Shortcut) files to trigger a multi-stage infection process. Technical Analysis & Infection Chain follow these safety protocols immediately:
: A modular Remote Access Trojan (RAT) known for its use by various APT groups.
If you have encountered this file, follow these safety protocols immediately: