General

  • Target

    1f838b557097cec534811e2e047195c457308376f4473def74e0435af5728f0e_NeikiAnalytics.exe

  • Size

    363KB

  • Sample

    240702-a6qxxazfnd

  • MD5

    40b62a37b08c7e9495295796f2fe46d0

  • SHA1

    9d75529123230660661a1e4f439691368ed7f4b3

  • SHA256

    1f838b557097cec534811e2e047195c457308376f4473def74e0435af5728f0e

  • SHA512

    46250e3a89fdfcec72ff1cb840fde15f03779a75cfafa2e1d063c2b0e4233e0827565659527219e82963868823168115485a37aff91ce686676574b2e25e5652

  • SSDEEP

    6144:lAFehJ5tT6rkOM0hbFY5tT2m29fbv25tT6rkOM0hbFY5tT:l55turkWhbi5tR2di5turkWhbi5t

Malware Config

Extracted

Family

gozi

Targets

    • Target

      1f838b557097cec534811e2e047195c457308376f4473def74e0435af5728f0e_NeikiAnalytics.exe

    • Size

      363KB

    • MD5

      40b62a37b08c7e9495295796f2fe46d0

    • SHA1

      9d75529123230660661a1e4f439691368ed7f4b3

    • SHA256

      1f838b557097cec534811e2e047195c457308376f4473def74e0435af5728f0e

    • SHA512

      46250e3a89fdfcec72ff1cb840fde15f03779a75cfafa2e1d063c2b0e4233e0827565659527219e82963868823168115485a37aff91ce686676574b2e25e5652

    • SSDEEP

      6144:lAFehJ5tT6rkOM0hbFY5tT2m29fbv25tT6rkOM0hbFY5tT:l55turkWhbi5tR2di5turkWhbi5t

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks