General

  • Target

    013ae947952bf860d6b2fe3e3373f720_NEIKI

  • Size

    3.5MB

  • Sample

    240508-vxwr1shc98

  • MD5

    013ae947952bf860d6b2fe3e3373f720

  • SHA1

    bf57db8fa17f721a40e6edd16fb0e57b17210eea

  • SHA256

    67420bf6ea7e3d5c31eef5ddc964c0e0ded6cd5cc4bf6b952ef76b6f024cd5c5

  • SHA512

    3157f2e0f4a01c475462d255fb478495c38cb8179b02d444fa12cde946ba00e56e13ced2e15f612e1028e3c03d122888d73253e8bb94c6f34dfc8c428a21817f

  • SSDEEP

    49152:xEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWZ:xEjlmQbfgSgwvSnN4iVJuT0xxMWsaqV

Malware Config

Extracted

Family

gozi

Targets

    • Target

      013ae947952bf860d6b2fe3e3373f720_NEIKI

    • Size

      3.5MB

    • MD5

      013ae947952bf860d6b2fe3e3373f720

    • SHA1

      bf57db8fa17f721a40e6edd16fb0e57b17210eea

    • SHA256

      67420bf6ea7e3d5c31eef5ddc964c0e0ded6cd5cc4bf6b952ef76b6f024cd5c5

    • SHA512

      3157f2e0f4a01c475462d255fb478495c38cb8179b02d444fa12cde946ba00e56e13ced2e15f612e1028e3c03d122888d73253e8bb94c6f34dfc8c428a21817f

    • SSDEEP

      49152:xEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWZ:xEjlmQbfgSgwvSnN4iVJuT0xxMWsaqV

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks