Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 22:57

General

  • Target

    2025-03-28_00800bab3a40f4a859303a5db032f3a1_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    00800bab3a40f4a859303a5db032f3a1

  • SHA1

    5f73f521539c177c42218b44a7a5dd4eae6655f7

  • SHA256

    8455f66d52f12ee5fcc84fc509b218b9ac091b7817018dfb24117aca006e79e6

  • SHA512

    a05315ee52a2aeb3d87b55b228f02d58f71b18ae378df6925ab0bc3b489fead795e87de722e6b55a547bbc644deaecf63a0d5578d494bb9ffebe32aa03a5b817

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VFuwrJ6itoB6/ztG/k7:pWvSDzaxztQVswr4B64y

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 3 IoCs
  • Renames multiple (52) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Loads dropped DLL 42 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 15 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-28_00800bab3a40f4a859303a5db032f3a1_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-28_00800bab3a40f4a859303a5db032f3a1_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip.dll

    Filesize

    4.2MB

    MD5

    1eed478ad63fd86b33318d5b404b7cc8

    SHA1

    513d799fd7b6d89cb2e72af057617729390dd3ca

    SHA256

    5ddcca38126e5ac94e95eb7fa837bb2c8cee036ec487f950cfb80dc77332e48e

    SHA512

    9e2e0753d0c551d932530513338a678e1d1e7a998e280083a2da30dd64fa48e5f82becc023f90d42f80b0276301860961b85eae3a44a96a39a7493106781a06f

  • C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL

    Filesize

    4.4MB

    MD5

    7dec16dee8a10da38c8426e16691c1dd

    SHA1

    8931895d9953b0c243a9dc07420256c24e7275cd

    SHA256

    786e33a3252eec27b7f39484fe219fa9f521c9e8b435e04e68dba6d6c23e9ba3

    SHA512

    0aa269877d7fc815daba1280907e64352866fb5a49a94f991f417bd810662c23153344e363d7bc3a0dfb95d641a3ac251628cf74e683e0941e8037e5978770f9

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    4672d0abc6aac1987bb550848cde0f0d

    SHA1

    03a52c2b1662fdd6e81473fc63671993ef3a888b

    SHA256

    536c13b807f89814ef9d28a27467f87299d58603778c3f621d60584ef4df9ea5

    SHA512

    3d47adf1c5d553dac054b3894c7aae74e141772529cadb6d967867f512eb556c1d1ad62dab803c041164a2f2e73450ac8d592ba733dc3ec8e33db7660930296b