Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 18:51

General

  • Target

    2025-03-30_b30f365f08255e2128297748c80b168f_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    b30f365f08255e2128297748c80b168f

  • SHA1

    fea92c5955ba118c3daf56c1a946e75e5238a350

  • SHA256

    66e7b1ec39e7e5108495046e828f292f32c0cabd6bde2a82ffd7e7bfeaea0195

  • SHA512

    701c45ecedc0972e98ebb66b2d5fa05c90e33dfb34a3d25d4cca5bfabd92c91a173ae3af4e9ae6659da3bba4cede671a758658313a7a0948dd2981e59cae48f9

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VQrWItDuB/sEXM:pWvSDzaxztQViWItDuBM

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 2 IoCs
  • Drops file in Drivers directory 39 IoCs
  • Manipulates Digital Signatures 3 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_b30f365f08255e2128297748c80b168f_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_b30f365f08255e2128297748c80b168f_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\PidGenX.dll

    Filesize

    5.3MB

    MD5

    67f3a5227cd4bd1a9be10f83aad155fd

    SHA1

    3adadbe9c4020ffdc020ac18979d5abf16b7da2e

    SHA256

    03ff5ee0ec3786af623daadee4e659ec8265bc279380b6f2e8df698c884e046e

    SHA512

    d7509f5b81853b390553a8ea1cf7549ab7b4c72a2fb1812f931c8bcc391c2464bf95d0b0aa2e329cd57a2f022ef989fa15d68ba466e04d1f3946fc572cfd0546

  • \Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll

    Filesize

    5.3MB

    MD5

    8243e9d9de9a3fd58f5d453fa760787f

    SHA1

    56a4310754518b3cdd3055b9bcb1fcf070e8bc21

    SHA256

    5867428d1721db822d3c5559d652031a4768f3dc13d52855f10afe7563f9a4fc

    SHA512

    bf881377949367b61d4a16683a61338e022466b9148def3996ba35b2926f3e22c71d5badc9ca00de3b97bdf8e72cb3bf5368cde34fe028eeca1c9500721b55fa