General

  • Target

    65b153ae3a98a8c96d510eaf6077f3d7615188314bd92a78551f0c9b1452fb27_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240627-jgz9qa1hrn

  • MD5

    d4d47c9e69062c1b444eb355c46599b0

  • SHA1

    cd33afeb2e6130820612d9fd759d36e00b43d910

  • SHA256

    65b153ae3a98a8c96d510eaf6077f3d7615188314bd92a78551f0c9b1452fb27

  • SHA512

    eaaf4e44adf8b3640092202d265f2a492f71e5610b785c169cd39f2496dc0958c11c6fc9caebbf3db2928ba2ca42a2714bd0596e7572c26c70d4f42ab23d632a

  • SSDEEP

    1536:PRZZV4Oz6bdI543vDOW4IglProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:pPVbz625277jgltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      65b153ae3a98a8c96d510eaf6077f3d7615188314bd92a78551f0c9b1452fb27_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      d4d47c9e69062c1b444eb355c46599b0

    • SHA1

      cd33afeb2e6130820612d9fd759d36e00b43d910

    • SHA256

      65b153ae3a98a8c96d510eaf6077f3d7615188314bd92a78551f0c9b1452fb27

    • SHA512

      eaaf4e44adf8b3640092202d265f2a492f71e5610b785c169cd39f2496dc0958c11c6fc9caebbf3db2928ba2ca42a2714bd0596e7572c26c70d4f42ab23d632a

    • SSDEEP

      1536:PRZZV4Oz6bdI543vDOW4IglProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:pPVbz625277jgltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks