Behavioral task
behavioral1
Sample
06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.elf
Resource
ubuntu2004-amd64-20240221-en
ubuntu-20.04-amd64
0 signatures
150 seconds
General
-
Target
06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.zip
-
Size
1.1MB
-
MD5
31692b884b0f8455d48a17e4d1b5d494
-
SHA1
e2f3a27d7d07715ee85661a6e6b6cd50ff832eac
-
SHA256
5e3d97c85f20db3a0fa5d50fd80c2a68841595c0d06cc8e5018c56488df156b8
-
SHA512
489307bb5e77c6e508dfa2a82880103ed2b9050c25d5af1fc54cafaeb46fdf763c87851a1ad5e5569d07da2206c34ad84f17a42e5e01aab543d9bd6ddbcff498
-
SSDEEP
24576:Fh4ZEAmq7nVbOyPslcnKyKi5vEsnHzZU0c0dpo58d++JOC:g7nJJkCnKyEQlU0c0dpovG
Score
10/10
Malware Config
Signatures
-
Detects Royal Ransomware payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.elf royal_unix -
Royal_unix family
Files
-
06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.zip.zip
Password: infected
-
06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725.elf.elf linux x64