General

  • Target

    d76a4073830ddfb2ef106ce052e405d0_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240519-rt8qmabf65

  • MD5

    d76a4073830ddfb2ef106ce052e405d0

  • SHA1

    71d30e5dd109fa41a6dfcdf59c2a9dc4dd116243

  • SHA256

    fde498c7521bfa40f8b02ffb173e34ec10567d8106bd2274aa4f65cdb5711a4d

  • SHA512

    57a456ac103e83269bff86adb9130c41eb450a2cf8a74eb27f7535598c102aeb92b6d3a6fb9f98c1c81e0be8571380d04fb1b2bda89a820f70482046eeb96207

  • SSDEEP

    1536:PwGzLl8fqBGKjRMp/xqLm3/AxDf5flProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:oELleuhRMYCAxDf5fltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      d76a4073830ddfb2ef106ce052e405d0_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      d76a4073830ddfb2ef106ce052e405d0

    • SHA1

      71d30e5dd109fa41a6dfcdf59c2a9dc4dd116243

    • SHA256

      fde498c7521bfa40f8b02ffb173e34ec10567d8106bd2274aa4f65cdb5711a4d

    • SHA512

      57a456ac103e83269bff86adb9130c41eb450a2cf8a74eb27f7535598c102aeb92b6d3a6fb9f98c1c81e0be8571380d04fb1b2bda89a820f70482046eeb96207

    • SSDEEP

      1536:PwGzLl8fqBGKjRMp/xqLm3/AxDf5flProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:oELleuhRMYCAxDf5fltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks