General

  • Target

    245648fc1e33576953d6c465d6305194b7e60813f5f265e9bfd809ae69689b10_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240625-c5s2zszcnr

  • MD5

    f91bd4e6bd61dddc877a69b360576170

  • SHA1

    bfb200537d74d738e37ecf975fcdcba9ebd72be4

  • SHA256

    245648fc1e33576953d6c465d6305194b7e60813f5f265e9bfd809ae69689b10

  • SHA512

    3696571238e19db32e9d287cc4a328fcc4b58f8523b640d2544b6e6038decb370c2c09f9fd9c396343f28a100d404fec3e86e0be9a4df50019d53ab74fc264cf

  • SSDEEP

    1536:PYx0Wwjyoxws9p8ceaDuJpjpkRTrvjlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:guWwNLp8cVDu3N+TrbltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      245648fc1e33576953d6c465d6305194b7e60813f5f265e9bfd809ae69689b10_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      f91bd4e6bd61dddc877a69b360576170

    • SHA1

      bfb200537d74d738e37ecf975fcdcba9ebd72be4

    • SHA256

      245648fc1e33576953d6c465d6305194b7e60813f5f265e9bfd809ae69689b10

    • SHA512

      3696571238e19db32e9d287cc4a328fcc4b58f8523b640d2544b6e6038decb370c2c09f9fd9c396343f28a100d404fec3e86e0be9a4df50019d53ab74fc264cf

    • SSDEEP

      1536:PYx0Wwjyoxws9p8ceaDuJpjpkRTrvjlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:guWwNLp8cVDu3N+TrbltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks