Behavioral task
behavioral1
Sample
06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.elf
Resource
ubuntu1804-amd64-20221111-en
0 signatures
1800 seconds
General
-
Target
h.zip
-
Size
1.1MB
-
MD5
db4ce8dc3d242eef564050348945047e
-
SHA1
69486ad63a5b5a63cc102eb17dc03e865a77990a
-
SHA256
ca9d2534dca9b7149794a9dc35207d558e050b9512c9794f4d62eb7dd7b383d5
-
SHA512
71b8371110faea124d2ef32abdf0033e633f929268dd08939d5fdee0a0054cbd47825957b1c5c6b67eca677ff9e4613ae2f7f7874627b4195d96bbf471ced396
-
SSDEEP
24576:DQ4XP78X4fPGKOvGrY2owC5UvQplp6esC3NPo:sa7WeP5OvGUwwpWC3Ng
Score
10/10
Malware Config
Signatures
-
Detects Royal Ransomware payload 1 IoCs
resource yara_rule static1/unpack001/06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.elf royal_unix -
Royal_unix family
Files
-
h.zip.zip
Password: infected
-
06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.elf.elf linux x64