General

  • Target

    0ec4247bd6e79af402248e8c170ee6e0_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240526-sy682abc3z

  • MD5

    0ec4247bd6e79af402248e8c170ee6e0

  • SHA1

    a3a03a6d30bc706fbaaefc602aee4ab0a7e28404

  • SHA256

    56d5eb3de3d9fcef5efbbb3fdcfbf02a59db8545a4376da1a67053f62a37f58b

  • SHA512

    21aa7c70a3fbb63d5e9f952772fb7b60962bb062c0248a0176ccb33e7239f814b5096150c0716087a12bf10a1db2ed4cb679862713f840f8bd0e9509e3872b31

  • SSDEEP

    1536:PQ9kT/NvSKptKIseF/we1lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:8kzBzse5we1ltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      0ec4247bd6e79af402248e8c170ee6e0_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      0ec4247bd6e79af402248e8c170ee6e0

    • SHA1

      a3a03a6d30bc706fbaaefc602aee4ab0a7e28404

    • SHA256

      56d5eb3de3d9fcef5efbbb3fdcfbf02a59db8545a4376da1a67053f62a37f58b

    • SHA512

      21aa7c70a3fbb63d5e9f952772fb7b60962bb062c0248a0176ccb33e7239f814b5096150c0716087a12bf10a1db2ed4cb679862713f840f8bd0e9509e3872b31

    • SSDEEP

      1536:PQ9kT/NvSKptKIseF/we1lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:8kzBzse5we1ltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks