Behavioral task
behavioral1
Sample
b57e5f0c857e807a03770feb4d3aa254d2c4c8c8d9e08687796be30e2093286c
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
230306-yt144sgcdg_pw_infected.zip
-
Size
1.2MB
-
MD5
ae5e5933b2a49b305bff84e8632afd09
-
SHA1
32e0fcb9368922f811f33d7dc14221e574b373f1
-
SHA256
32810696c33d7a85e43aeb52814ebea01ace75f98586eceb520d05147eb8427d
-
SHA512
c8c936bd813f96410e8bdaed8affa605e85b3b50011cf1a595be32b569f0bde34cdb4620a6bd63dc9081132935b5c956ac8f60d97b0890b06614ff68f018e546
-
SSDEEP
24576:KztJxCAQf0n617uykbCmzxjTnzzbh3qT7jNKUJBXfubThZwoT8:exEffCn5vnzz1sVJBPw+oT8
Score
10/10
Malware Config
Signatures
-
Detects Royal Ransomware payload 1 IoCs
resource yara_rule static1/unpack001/b57e5f0c857e807a03770feb4d3aa254d2c4c8c8d9e08687796be30e2093286c royal_unix -
Royal_unix family
Files
-
230306-yt144sgcdg_pw_infected.zip.zip
Password: infected
-
b57e5f0c857e807a03770feb4d3aa254d2c4c8c8d9e08687796be30e2093286c.elf linux x64