General

  • Target

    c0bbb0a9717aaa97477fcc6763cb8640_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240520-gt11nseg94

  • MD5

    c0bbb0a9717aaa97477fcc6763cb8640

  • SHA1

    d82b4cad4f0662b2b1370fb3743a96609488a28e

  • SHA256

    3dc6fc399a22c53ec6af61ec2e2c46631ab1f363a26435bee68060e1a16f354f

  • SHA512

    91fd3b8ad07ba746c8b009b0f2fdb2ee28dcc0cfbb507534ee87c644ff3397e72b60fff2bd51b1be815f23d2bb8df9851801538d1baeab0c6a1e715c5f428ee7

  • SSDEEP

    1536:PFkJ+u2OzD68mKQSGoiXcsGFRLFlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:Nfu2OPT+SuMHLFltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      c0bbb0a9717aaa97477fcc6763cb8640_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      c0bbb0a9717aaa97477fcc6763cb8640

    • SHA1

      d82b4cad4f0662b2b1370fb3743a96609488a28e

    • SHA256

      3dc6fc399a22c53ec6af61ec2e2c46631ab1f363a26435bee68060e1a16f354f

    • SHA512

      91fd3b8ad07ba746c8b009b0f2fdb2ee28dcc0cfbb507534ee87c644ff3397e72b60fff2bd51b1be815f23d2bb8df9851801538d1baeab0c6a1e715c5f428ee7

    • SSDEEP

      1536:PFkJ+u2OzD68mKQSGoiXcsGFRLFlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:Nfu2OPT+SuMHLFltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks