General

  • Target

    3d425c7bf149da40b307312b0889bf10_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240517-1ra61sch7y

  • MD5

    3d425c7bf149da40b307312b0889bf10

  • SHA1

    3640a23d6fd72a4b1cdedd868408a02dc07cb8a9

  • SHA256

    aa38a7ea8cbe42951a8d6e21cad5486bee95e8c486b6d67f4ded8e59c2ef2891

  • SHA512

    a02e132a745e18e6e3cabe1a54e4db71fcc59b66ee47b26af359098c8773540ee61693f4c3b724271d9cc6e6488cc8b9679763dbe9b142f1f550d5bf44bac8f9

  • SSDEEP

    3072:xDlG8Sgsz1xJCKxCoxKsnltOrWKDBr+yJb:tE8SLJCKxvxTnLOf

Malware Config

Extracted

Family

gozi

Targets

    • Target

      3d425c7bf149da40b307312b0889bf10_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      3d425c7bf149da40b307312b0889bf10

    • SHA1

      3640a23d6fd72a4b1cdedd868408a02dc07cb8a9

    • SHA256

      aa38a7ea8cbe42951a8d6e21cad5486bee95e8c486b6d67f4ded8e59c2ef2891

    • SHA512

      a02e132a745e18e6e3cabe1a54e4db71fcc59b66ee47b26af359098c8773540ee61693f4c3b724271d9cc6e6488cc8b9679763dbe9b142f1f550d5bf44bac8f9

    • SSDEEP

      3072:xDlG8Sgsz1xJCKxCoxKsnltOrWKDBr+yJb:tE8SLJCKxvxTnLOf

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks