General

  • Target

    41fed48ae2ce8746daf2df9c17e187d0_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240525-k4h5dscf77

  • MD5

    41fed48ae2ce8746daf2df9c17e187d0

  • SHA1

    3707488bd0ae8916a277850545246ef92d262d38

  • SHA256

    00f9b935bf76f99c03d1418f7ac88662ff047de213750719bc1d2b021578b9b1

  • SHA512

    18381b819f05d71b7b030414bc3d93240089ea1212a84df243335f7941090890e5627f9ffa1fdebb24dae609d27229319397020ba481b420c8ce23fe6ebd3901

  • SSDEEP

    3072:KSGvq78MjtP+zzf3/9a+ltOrWKDBr+yJb:1Gi9Gzzf31BLOf

Malware Config

Extracted

Family

gozi

Targets

    • Target

      41fed48ae2ce8746daf2df9c17e187d0_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      41fed48ae2ce8746daf2df9c17e187d0

    • SHA1

      3707488bd0ae8916a277850545246ef92d262d38

    • SHA256

      00f9b935bf76f99c03d1418f7ac88662ff047de213750719bc1d2b021578b9b1

    • SHA512

      18381b819f05d71b7b030414bc3d93240089ea1212a84df243335f7941090890e5627f9ffa1fdebb24dae609d27229319397020ba481b420c8ce23fe6ebd3901

    • SSDEEP

      3072:KSGvq78MjtP+zzf3/9a+ltOrWKDBr+yJb:1Gi9Gzzf31BLOf

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks