General
-
Target
https://files.offshore.cat/roBYA9SU.zip
-
Sample
241029-ty9vlavrhw
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://files.offshore.cat/roBYA9SU.zip
Resource
win10v2004-20241007-en
windows10-2004-x64
27 signatures
300 seconds
Malware Config
Targets
-
-
Target
https://files.offshore.cat/roBYA9SU.zip
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1