General

  • Target

    a5d676bf2333c24096aa7e658bc73390_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240517-eyhc1shc32

  • MD5

    a5d676bf2333c24096aa7e658bc73390

  • SHA1

    062a3fe5ac692602566b2628e2eeb42c20aec3cc

  • SHA256

    b02d1fbeeb25bd0def829f0c2a26e3e33cec5d2a42c95e13f0fee3e85e64ca23

  • SHA512

    403a1dea6f949589d82c0a9fce25abf849c8d4e966c9d3bcd307573c102c6f275a31388549a5251b95e0a05984759039ea0800a2bd22f484e5702eb228ac0680

  • SSDEEP

    1536:P3O0RZViAazzxymcrT8UbYlEmlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:BVVGERYlEmltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      a5d676bf2333c24096aa7e658bc73390_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      a5d676bf2333c24096aa7e658bc73390

    • SHA1

      062a3fe5ac692602566b2628e2eeb42c20aec3cc

    • SHA256

      b02d1fbeeb25bd0def829f0c2a26e3e33cec5d2a42c95e13f0fee3e85e64ca23

    • SHA512

      403a1dea6f949589d82c0a9fce25abf849c8d4e966c9d3bcd307573c102c6f275a31388549a5251b95e0a05984759039ea0800a2bd22f484e5702eb228ac0680

    • SSDEEP

      1536:P3O0RZViAazzxymcrT8UbYlEmlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:BVVGERYlEmltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks