General

  • Target

    66f75fedc0047902b4c1149fe9dff9e0_NeikiAnalytics.exe

  • Size

    163KB

  • Sample

    240530-gfqyjshe94

  • MD5

    66f75fedc0047902b4c1149fe9dff9e0

  • SHA1

    ba9d60f0eec294283eacc8db7a5b43d7775357d6

  • SHA256

    e20da7df89808ff8cea4629121493175d386accff8eba3c94fc3a4343ff371c0

  • SHA512

    3b58dd184eaadd83675188107fd12b80077f60677a4a7ca2909eac3df77eb5d0ac39e85ae4c4108681d29874a485b96c857b8253b36fc5b657db1a7840d3cca4

  • SSDEEP

    1536:PKh0Xe/ox2Yn3Mmkq/bpz1eNiMxXdD3lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNy:H8ox2K8mkuqfDltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      66f75fedc0047902b4c1149fe9dff9e0_NeikiAnalytics.exe

    • Size

      163KB

    • MD5

      66f75fedc0047902b4c1149fe9dff9e0

    • SHA1

      ba9d60f0eec294283eacc8db7a5b43d7775357d6

    • SHA256

      e20da7df89808ff8cea4629121493175d386accff8eba3c94fc3a4343ff371c0

    • SHA512

      3b58dd184eaadd83675188107fd12b80077f60677a4a7ca2909eac3df77eb5d0ac39e85ae4c4108681d29874a485b96c857b8253b36fc5b657db1a7840d3cca4

    • SSDEEP

      1536:PKh0Xe/ox2Yn3Mmkq/bpz1eNiMxXdD3lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNy:H8ox2K8mkuqfDltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks