General

  • Target

    4ebe2605b9414cd6563aadff1c550ce183e2f13ffe0769d5e70cb3b5de6ac734_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240701-nn95qaseml

  • MD5

    8f7485b11ce5b8bfce366d56104403e0

  • SHA1

    7fc38cf3f0d72d6a25f81f62068e7c2f2630224d

  • SHA256

    4ebe2605b9414cd6563aadff1c550ce183e2f13ffe0769d5e70cb3b5de6ac734

  • SHA512

    9b3e3e3d8cd446386fbb12ef4d2cd62c573246d441e5a041e6268ae703b5506dac380119131ec275d4899f1d21268e72c1b8c159e3e83ef1fbaa4d6161e03dcc

  • SSDEEP

    3072:CZMINk/zuL21kvmVoGQanLltOrWKDBr+yJb:eNke21kvmexqLLOf

Malware Config

Extracted

Family

gozi

Targets

    • Target

      4ebe2605b9414cd6563aadff1c550ce183e2f13ffe0769d5e70cb3b5de6ac734_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      8f7485b11ce5b8bfce366d56104403e0

    • SHA1

      7fc38cf3f0d72d6a25f81f62068e7c2f2630224d

    • SHA256

      4ebe2605b9414cd6563aadff1c550ce183e2f13ffe0769d5e70cb3b5de6ac734

    • SHA512

      9b3e3e3d8cd446386fbb12ef4d2cd62c573246d441e5a041e6268ae703b5506dac380119131ec275d4899f1d21268e72c1b8c159e3e83ef1fbaa4d6161e03dcc

    • SSDEEP

      3072:CZMINk/zuL21kvmVoGQanLltOrWKDBr+yJb:eNke21kvmexqLLOf

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks