Behavioral task
behavioral1
Sample
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.elf
Resource
ubuntu1804-amd64-20230621-en
0 signatures
150 seconds
General
-
Target
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.zip
-
Size
1.1MB
-
MD5
6016e4fb5efbbb5f94d701fd65d25712
-
SHA1
53dfacf36208bd43c3ac078457ba45fcd56fef5f
-
SHA256
23c9dc43c01e6c4cc1b635158e9ea2e503966de8ce4c719ef0e8a9c77b8a3188
-
SHA512
c55d5be5741494bc0f081387e955a8dd4a4456aa289c219fb9e51d3bb21b3c4d0ad5e2e75820cc69450ae1326d21ab89cc39174317ae374b98a7eda036fb6724
-
SSDEEP
24576:Sc/ne100qL70E4J4ECvImB/zYrXe0AD6lLHev5SFpUfF5F:z/ne+0qEE4G9Z/zYrXzjev5D5F
Score
10/10
Malware Config
Signatures
-
Detects Royal Ransomware payload 1 IoCs
resource yara_rule static1/unpack001/09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.elf royal_unix -
Royal_unix family
Files
-
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.zip.zip
Password: infected
-
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.elf.elf linux x64