General

  • Target

    8d23e953e69c20634abab6afcf1d5ec8062d2ed8ece58166b5e690f19332c539_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240628-jldlhs1dkq

  • MD5

    ef5a78af5fd0d9a9de04f49d0c2be860

  • SHA1

    006c9437035975dcca19e3e7834e1e33266d0ace

  • SHA256

    8d23e953e69c20634abab6afcf1d5ec8062d2ed8ece58166b5e690f19332c539

  • SHA512

    8fa5392aac55f349d22d04b4a49f36f6322d9ec64010dd8cc3d8e085e7dee2c8f8189fb06ffde2f7488627e5ea3a817976fbd4990a137a165f7caad5fb8daa8f

  • SSDEEP

    1536:PyO1ZPwwSV1WyTCKA6rWerLYx02QJjTam97lProNVU4qNVUrk/9QbfBr+7GwKrPb:vjwwelCnwoGae7ltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      8d23e953e69c20634abab6afcf1d5ec8062d2ed8ece58166b5e690f19332c539_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      ef5a78af5fd0d9a9de04f49d0c2be860

    • SHA1

      006c9437035975dcca19e3e7834e1e33266d0ace

    • SHA256

      8d23e953e69c20634abab6afcf1d5ec8062d2ed8ece58166b5e690f19332c539

    • SHA512

      8fa5392aac55f349d22d04b4a49f36f6322d9ec64010dd8cc3d8e085e7dee2c8f8189fb06ffde2f7488627e5ea3a817976fbd4990a137a165f7caad5fb8daa8f

    • SSDEEP

      1536:PyO1ZPwwSV1WyTCKA6rWerLYx02QJjTam97lProNVU4qNVUrk/9QbfBr+7GwKrPb:vjwwelCnwoGae7ltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks