Bunk-bed.7z -

: The shortcut runs the legitimate executable, which unknowingly loads the malicious DLL ( DLL Sideloading ). This DLL then decrypts and runs the final payload in memory to avoid detection by traditional antivirus. Associated Malware Families

: Inside the archive, there is typically a malicious Windows Shortcut ( .lnk ). When a user double-clicks it, it executes a hidden command (often using cmd.exe or powershell.exe ). Bunk-Bed.7z

: A modular Remote Access Trojan (RAT) known for its use by various APT groups. : The shortcut runs the legitimate executable, which

A renamed to match a DLL that the legitimate executable expects to load. An encrypted payload (the actual malware). When a user double-clicks it, it executes a

: Use a reputable EDR (Endpoint Detection and Response) or Antivirus tool to perform a full system scan, preferably in Safe Mode.

: Often bundled in archives to harvest browser credentials, credit card info, and crypto wallets. Recommended Actions

Files using this naming convention have been linked to several high-profile malware families: