Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 18:51

General

  • Target

    2025-03-30_b30f365f08255e2128297748c80b168f_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    b30f365f08255e2128297748c80b168f

  • SHA1

    fea92c5955ba118c3daf56c1a946e75e5238a350

  • SHA256

    66e7b1ec39e7e5108495046e828f292f32c0cabd6bde2a82ffd7e7bfeaea0195

  • SHA512

    701c45ecedc0972e98ebb66b2d5fa05c90e33dfb34a3d25d4cca5bfabd92c91a173ae3af4e9ae6659da3bba4cede671a758658313a7a0948dd2981e59cae48f9

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VQrWItDuB/sEXM:pWvSDzaxztQViWItDuBM

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 3 IoCs
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 36 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_b30f365f08255e2128297748c80b168f_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_b30f365f08255e2128297748c80b168f_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:4256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip.dll

    Filesize

    4.2MB

    MD5

    b2b20063e871389db3463549efd8b5ac

    SHA1

    f23419d99a5b4ba6feb0aa079368af2cfce2a719

    SHA256

    68912a18f09ff4c9b0c5ec47d4e07557b2a17a9103645dcaf99915eb53380d8e

    SHA512

    9f9da4567ff68efe85ce8da6953d2792859f52891a2f3cc9527bdaa3182d5a6694463cec26f509f360189bc3feded66985d43ac0e1d5639ba05c4204a683e0f1

  • C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL

    Filesize

    4.4MB

    MD5

    3d1df67b20a4ad71cbe6b5bf02d363f5

    SHA1

    5148c758a5e4562b93b9193c743ad91becc391ea

    SHA256

    0cbd30a743fb1d4390e78d34da144b4d486204311d35e438999c146cba7cf7b7

    SHA512

    878067ba6864cedec9fd2e08819c6de9706182e21545375eaae5c4f5955a03e104a99936dff502442dc8137a3b8007b765bc1a5797c0965d7c8493a7621e501c

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    15773e10fb485904dc548d0d57106e68

    SHA1

    3bad28e49759f35cc9fc26e286947beaa91e7631

    SHA256

    1a5476b26f90da448896611397a9caff00e1a06297f5211b00705ba3e50f69e0

    SHA512

    7ebb0a39723ed491b4881564bff3aa3e0f9d738d3ec4fe276da5157dc0e19c1da324fa908fb21114b94950e052d7cabfbc43ee224f35474ce108cfdd09b37eac