General

  • Target

    fc3a4b1236678415b31c5fa16e5734c0_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240519-vmzqxsgg67

  • MD5

    fc3a4b1236678415b31c5fa16e5734c0

  • SHA1

    d31d3a94be58c43cf5f830fed8ba9c8ae9b6b490

  • SHA256

    b97cc8473e110ffb6eebad6b3161feb49bc89d0621be41566c0436be54457dfb

  • SHA512

    fad18e469a1c37611a8b7bcbc79f3f9e173a61508f49f77d02f11b3c8fcd245cc6ea0d434c6cd1d73007d48f952442cb249bf538be2d203d16007d67387be519

  • SSDEEP

    3072:mR66og8w6/6VXs86ti3fSaltOrWKDBr+yJb:muNMXsnuf9LOf

Malware Config

Extracted

Family

gozi

Targets

    • Target

      fc3a4b1236678415b31c5fa16e5734c0_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      fc3a4b1236678415b31c5fa16e5734c0

    • SHA1

      d31d3a94be58c43cf5f830fed8ba9c8ae9b6b490

    • SHA256

      b97cc8473e110ffb6eebad6b3161feb49bc89d0621be41566c0436be54457dfb

    • SHA512

      fad18e469a1c37611a8b7bcbc79f3f9e173a61508f49f77d02f11b3c8fcd245cc6ea0d434c6cd1d73007d48f952442cb249bf538be2d203d16007d67387be519

    • SSDEEP

      3072:mR66og8w6/6VXs86ti3fSaltOrWKDBr+yJb:muNMXsnuf9LOf

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks