General
-
Target
013ae947952bf860d6b2fe3e3373f720_NEIKI
-
Size
3.5MB
-
Sample
240508-vxwr1shc98
-
MD5
013ae947952bf860d6b2fe3e3373f720
-
SHA1
bf57db8fa17f721a40e6edd16fb0e57b17210eea
-
SHA256
67420bf6ea7e3d5c31eef5ddc964c0e0ded6cd5cc4bf6b952ef76b6f024cd5c5
-
SHA512
3157f2e0f4a01c475462d255fb478495c38cb8179b02d444fa12cde946ba00e56e13ced2e15f612e1028e3c03d122888d73253e8bb94c6f34dfc8c428a21817f
-
SSDEEP
49152:xEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWZ:xEjlmQbfgSgwvSnN4iVJuT0xxMWsaqV
Behavioral task
behavioral1
Sample
013ae947952bf860d6b2fe3e3373f720_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
013ae947952bf860d6b2fe3e3373f720_NEIKI.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
gozi
Targets
-
-
Target
013ae947952bf860d6b2fe3e3373f720_NEIKI
-
Size
3.5MB
-
MD5
013ae947952bf860d6b2fe3e3373f720
-
SHA1
bf57db8fa17f721a40e6edd16fb0e57b17210eea
-
SHA256
67420bf6ea7e3d5c31eef5ddc964c0e0ded6cd5cc4bf6b952ef76b6f024cd5c5
-
SHA512
3157f2e0f4a01c475462d255fb478495c38cb8179b02d444fa12cde946ba00e56e13ced2e15f612e1028e3c03d122888d73253e8bb94c6f34dfc8c428a21817f
-
SSDEEP
49152:xEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWZ:xEjlmQbfgSgwvSnN4iVJuT0xxMWsaqV
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-