General

  • Target

    8cc45f5896617d6fba4cd0d69c5d31fd0a4b8bc599b8a117658c1112d0e03e5c_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240628-jhfaya1brm

  • MD5

    eba3b9db2330fad033c665d5a4c4dd90

  • SHA1

    ce74ab42208f835a4f42553e11c8d637b9d01d67

  • SHA256

    8cc45f5896617d6fba4cd0d69c5d31fd0a4b8bc599b8a117658c1112d0e03e5c

  • SHA512

    70aece238d17d7386ee5be3759531e63b05d2a391313168265361c7dbb130c70898c11067768ac72302d04dcaf5b1ac3c8d4ec9c04b648cee384bb18a61ad621

  • SSDEEP

    1536:PPV+hMQGsBktEgkqjf+npazM8vlvb14lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNy:l+hMQOEnqjmpaN2ltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      8cc45f5896617d6fba4cd0d69c5d31fd0a4b8bc599b8a117658c1112d0e03e5c_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      eba3b9db2330fad033c665d5a4c4dd90

    • SHA1

      ce74ab42208f835a4f42553e11c8d637b9d01d67

    • SHA256

      8cc45f5896617d6fba4cd0d69c5d31fd0a4b8bc599b8a117658c1112d0e03e5c

    • SHA512

      70aece238d17d7386ee5be3759531e63b05d2a391313168265361c7dbb130c70898c11067768ac72302d04dcaf5b1ac3c8d4ec9c04b648cee384bb18a61ad621

    • SSDEEP

      1536:PPV+hMQGsBktEgkqjf+npazM8vlvb14lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNy:l+hMQOEnqjmpaN2ltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks