General

  • Target

    3830b9bf30551aa25d02ca640edc1e60_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240519-a3xw2shd48

  • MD5

    3830b9bf30551aa25d02ca640edc1e60

  • SHA1

    420fb8cb5e618e2135264bb4aa11ca7c183df404

  • SHA256

    a098e84fc46466976fba6e1fcbbaaa509c39d0112b70f07cf27d1fba36c13218

  • SHA512

    c4a8a7f4ce4aa3418866b906867b3964b14b0ccc56a57cd45d89f14e828f1c327a03e60de8fb8950ec721559d03940b1003b6414666eab1e8af37d154e294e49

  • SSDEEP

    1536:P5mbrwx+F4p1QxWBZeQ/VrlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:RQsfCoBQQ/VrltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      3830b9bf30551aa25d02ca640edc1e60_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      3830b9bf30551aa25d02ca640edc1e60

    • SHA1

      420fb8cb5e618e2135264bb4aa11ca7c183df404

    • SHA256

      a098e84fc46466976fba6e1fcbbaaa509c39d0112b70f07cf27d1fba36c13218

    • SHA512

      c4a8a7f4ce4aa3418866b906867b3964b14b0ccc56a57cd45d89f14e828f1c327a03e60de8fb8950ec721559d03940b1003b6414666eab1e8af37d154e294e49

    • SSDEEP

      1536:P5mbrwx+F4p1QxWBZeQ/VrlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:RQsfCoBQQ/VrltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks