General

  • Target

    b6a3e131046e4e042199d2662cfdf16fa6574ba9d4a9d6824253fe70b8492fe8_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240629-wxdf4swclk

  • MD5

    a778808641c881b63ac226ca0cdaa480

  • SHA1

    8b2eda4670943ccc6b642924ae7a49f5ea077daa

  • SHA256

    b6a3e131046e4e042199d2662cfdf16fa6574ba9d4a9d6824253fe70b8492fe8

  • SHA512

    23961a9ecc29452d04dd16ee9a4c2668dee7ca93141ad436f79f056d45abadba42ca1c2939a66db55fb5713bde12237aa1af176a36c17eb2fdd6908e4e66b046

  • SSDEEP

    3072:WEZGBTEa9lYTTe4U823ltOrWKDBr+yJb:ITEafYvDU823LOf

Malware Config

Extracted

Family

gozi

Targets

    • Target

      b6a3e131046e4e042199d2662cfdf16fa6574ba9d4a9d6824253fe70b8492fe8_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      a778808641c881b63ac226ca0cdaa480

    • SHA1

      8b2eda4670943ccc6b642924ae7a49f5ea077daa

    • SHA256

      b6a3e131046e4e042199d2662cfdf16fa6574ba9d4a9d6824253fe70b8492fe8

    • SHA512

      23961a9ecc29452d04dd16ee9a4c2668dee7ca93141ad436f79f056d45abadba42ca1c2939a66db55fb5713bde12237aa1af176a36c17eb2fdd6908e4e66b046

    • SSDEEP

      3072:WEZGBTEa9lYTTe4U823ltOrWKDBr+yJb:ITEafYvDU823LOf

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks