General

  • Target

    8a8aa0127badc3bbb6f8df37e5565855ead8ffe7df01dc78ba7e583e48472a7c_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240629-kang1sxbkl

  • MD5

    887147f68fc4cee5c8e1fbc3e84c9500

  • SHA1

    9b7453c44e2eb38bd56834f775827daa470996b4

  • SHA256

    8a8aa0127badc3bbb6f8df37e5565855ead8ffe7df01dc78ba7e583e48472a7c

  • SHA512

    a9a8fbdd20aaef703a7002d7f1ccd514f241a03e79a9dc90e6e0ffb72be6b2b8f32bf409e3d0c9e0ffe9a5d6186e56e00794dd6dbc0c71c4d10be0f5d42f9973

  • SSDEEP

    1536:PIVWrTMaSBpl4mPjon/dOYNcwIlkKDexr49YdcInJ/lProNVU4qNVUrk/9QbfBrN:BrIVBpKkwlIY1J/ltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      8a8aa0127badc3bbb6f8df37e5565855ead8ffe7df01dc78ba7e583e48472a7c_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      887147f68fc4cee5c8e1fbc3e84c9500

    • SHA1

      9b7453c44e2eb38bd56834f775827daa470996b4

    • SHA256

      8a8aa0127badc3bbb6f8df37e5565855ead8ffe7df01dc78ba7e583e48472a7c

    • SHA512

      a9a8fbdd20aaef703a7002d7f1ccd514f241a03e79a9dc90e6e0ffb72be6b2b8f32bf409e3d0c9e0ffe9a5d6186e56e00794dd6dbc0c71c4d10be0f5d42f9973

    • SSDEEP

      1536:PIVWrTMaSBpl4mPjon/dOYNcwIlkKDexr49YdcInJ/lProNVU4qNVUrk/9QbfBrN:BrIVBpKkwlIY1J/ltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks