General

  • Target

    7d939d9d374e510b667891bb830c83167d9b48aec01edf3896beb9db0cdbafcc_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240627-mlnm9syhrm

  • MD5

    2443821f8d9fa8f9ce471d2ab90bba60

  • SHA1

    558f6842251f90095c9cac7319d6f3451aa4a6cf

  • SHA256

    7d939d9d374e510b667891bb830c83167d9b48aec01edf3896beb9db0cdbafcc

  • SHA512

    65709b2b7cc74964b783fd6e3eea4d5f844647e60d284426a56c439ca00c3038844a4f42a1c912f1302d022847ab7b48219e62ccf65e0560a54d25a9b866fceb

  • SSDEEP

    1536:PcgaznK/fcetnx3L7Q3rKRzDnNhgHNm3k7lProNVU4qNVUrk/9QbfBr+7GwKrPAS:m7Ikef3Y3QfnNhg007ltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      7d939d9d374e510b667891bb830c83167d9b48aec01edf3896beb9db0cdbafcc_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      2443821f8d9fa8f9ce471d2ab90bba60

    • SHA1

      558f6842251f90095c9cac7319d6f3451aa4a6cf

    • SHA256

      7d939d9d374e510b667891bb830c83167d9b48aec01edf3896beb9db0cdbafcc

    • SHA512

      65709b2b7cc74964b783fd6e3eea4d5f844647e60d284426a56c439ca00c3038844a4f42a1c912f1302d022847ab7b48219e62ccf65e0560a54d25a9b866fceb

    • SSDEEP

      1536:PcgaznK/fcetnx3L7Q3rKRzDnNhgHNm3k7lProNVU4qNVUrk/9QbfBr+7GwKrPAS:m7Ikef3Y3QfnNhg007ltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks