Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 18:17

General

  • Target

    2025-03-30_11e310337369a6f765655ff0aee83470_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    11e310337369a6f765655ff0aee83470

  • SHA1

    27f69d55df7c3fa857aafb24ade04701636056ce

  • SHA256

    db3b522adfe5bd882992b9d8fb6b226863553f602cf9c4d5e2306fec1eb8cd02

  • SHA512

    7e667cc8181f4e0f289bcdb6dac4f62a186f85f63382c5369a6262d78e29fa24d56961f27b32a2e5d7a24d6a298450f39343038ce1bb2e41817546f576e28ad6

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VdK83WqRZFgB:pWvSDzaxztQVdKx

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 3 IoCs
  • Renames multiple (51) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_11e310337369a6f765655ff0aee83470_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_11e310337369a6f765655ff0aee83470_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll

    Filesize

    4.2MB

    MD5

    8ac7c64c79cd8867dd4b58e078858c1d

    SHA1

    e2e90bef4eac2a2177d090c1308ad445375b07b4

    SHA256

    b4b23a037ddee95367a01e87d025cb55c90a7f68aa4896312b4724023bd2362e

    SHA512

    7bf682b20363b9b759c7f62e0bb8894fc60d2d855c74e32aec7260a5552c50e2eefe41586edc45b59a6f7362bcd5f513edc5f6135a97366ebc68cfb019e981b2

  • C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL

    Filesize

    4.4MB

    MD5

    f253304420d4d8b2ca728854adc3ae1f

    SHA1

    b197369bbe176932664a7a29a1c3d33d699d30d4

    SHA256

    25172fca7bb3035610c2d2c846fe11589508a4bfa23af0daab37712d96aab8c5

    SHA512

    37b8a9a61f08a542c87b5a74a327ccf685d40f90f4b261746269d857dedb9044f1c6102b955233ae55c5ce68d7ebf5c17a22f36acf16e46c72ffb7fd30b46831

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    3017ffd423f56025517bf370bd8fb0d8

    SHA1

    d57b16a4a6445578e29579b5659e255e7f29a6f2

    SHA256

    e085df193ffb22c2b993f7813ad6e7c926e25d0c112a37eb56c471d98e60f6d6

    SHA512

    b3ad6f47f448b1bdd2a73b07d578a4ee2a96faada0e5e0f4e16baa822398d915664e92bb1549625e8144b25e88cc7a240cb02b7ccb37a3006f6fa995d30c48d1