General

  • Target

    2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240620-ddzacszamj

  • MD5

    d15f8c4fbcbc2179b5ff9a4a7a756e20

  • SHA1

    75f6f97650583e00737f4104d5f224b2612696da

  • SHA256

    2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb

  • SHA512

    f983bfbd8af6ed14e1e4d2bda7eb6646845a63902447ebe61ec6735935625dd57f5e8df748aceba4264f8d8fa057b230290bacfb62d4b2adda1727a4f4a056c8

  • SSDEEP

    3072:nYqFvumbaFKtaJGyqDyltOrWKDBr+yJb:Yqp7cJaDyLOf

Malware Config

Extracted

Family

gozi

Targets

    • Target

      2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      d15f8c4fbcbc2179b5ff9a4a7a756e20

    • SHA1

      75f6f97650583e00737f4104d5f224b2612696da

    • SHA256

      2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb

    • SHA512

      f983bfbd8af6ed14e1e4d2bda7eb6646845a63902447ebe61ec6735935625dd57f5e8df748aceba4264f8d8fa057b230290bacfb62d4b2adda1727a4f4a056c8

    • SSDEEP

      3072:nYqFvumbaFKtaJGyqDyltOrWKDBr+yJb:Yqp7cJaDyLOf

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks