https://github.com/hak5/bashbunny-payloads/tree/master/payloads/library/usb_exfiltrator
Exfiltrates files from the users Documents folder Saves to the loot folder on the Bash Bunny USB Mass Storage partition named by the victim hostname, date and timestamp.
@TTommy - just went to create a pull request with the fix for this and found it's already been submitted! You can find it here: https://github.com/hak5/bashbunny-payloads/pull/17
If you want to apply the changes manually in the meantime, you can see the changes made here: https://github.com/hak5/bashbunny-payloads/pull/17/files