General

  • Target

    5f56609b4a066e9c118b7032f61fdd2989cc6a519c8518b3e4b0ed2b49830315_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240626-ha6x9azgqb

  • MD5

    5693bd95df72330658c2c2698028b3f0

  • SHA1

    e955356e7c0135d16ca9109817ae2598c81193e1

  • SHA256

    5f56609b4a066e9c118b7032f61fdd2989cc6a519c8518b3e4b0ed2b49830315

  • SHA512

    a9ea25c97c7983c616f25a8cb0cce992a9dcd38c8bef8d43c844a1d9bc38515f231247cf61aced7e3c342c1b7916c1859f2c755cfd2fa6314933bf9fcefa5787

  • SSDEEP

    1536:PrqBtIgpHCGZ3ULqyksCMYublProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:j0xpHhZEZks/bltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      5f56609b4a066e9c118b7032f61fdd2989cc6a519c8518b3e4b0ed2b49830315_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      5693bd95df72330658c2c2698028b3f0

    • SHA1

      e955356e7c0135d16ca9109817ae2598c81193e1

    • SHA256

      5f56609b4a066e9c118b7032f61fdd2989cc6a519c8518b3e4b0ed2b49830315

    • SHA512

      a9ea25c97c7983c616f25a8cb0cce992a9dcd38c8bef8d43c844a1d9bc38515f231247cf61aced7e3c342c1b7916c1859f2c755cfd2fa6314933bf9fcefa5787

    • SSDEEP

      1536:PrqBtIgpHCGZ3ULqyksCMYublProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:j0xpHhZEZks/bltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks