Analysis

  • max time kernel
    134s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 18:57

General

  • Target

    2025-03-30_5baf2c6dbc142c015b967226a9458f06_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    4.2MB

  • MD5

    5baf2c6dbc142c015b967226a9458f06

  • SHA1

    bc22f24e3b694a748c067816c11fba6557004e23

  • SHA256

    9c38ed5f117376d3308f58e8d0a1fa7914944250134ba581fd3a08b3a957e493

  • SHA512

    d9cea1233e4edc642668047ddce47bfb065391478a9a5e43278085e02a9cb285c3f221c05e743a8c59f436cbdd58d6fe5d64ea97983f11e363546dc95ae9ce0e

  • SSDEEP

    49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4R:ieF+iIAEl1JPz212IhzL+Bzz3dw/VP

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 4 IoCs
  • Drops file in Drivers directory 39 IoCs
  • Manipulates Digital Signatures 3 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 22 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_5baf2c6dbc142c015b967226a9458f06_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_5baf2c6dbc142c015b967226a9458f06_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\PidGenX.dll

    Filesize

    5.3MB

    MD5

    3ac9de02f64a1bd5a66aeee65779f512

    SHA1

    e0d41b136acd9999bc3e7cedd99faf117e9f9a2d

    SHA256

    131cba5f25c6d417bd103b145c4dda77b9016eead9e0ced0888edd8af39bb078

    SHA512

    57e8a8aa008b525435eaf6b3c7bdb30830549dd0613ce11656e205512e092af751adcc8791e649235333ef573377a415160281ccdfc8f8cbdca22727164864d4

  • \Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll

    Filesize

    5.3MB

    MD5

    2348205bf21eff5ca053c64966ddaee9

    SHA1

    9975627cc65aaaedc51a13767ae469f6aae9fc2c

    SHA256

    7ec9769d60473e61080c0c27be90bc39a9e7c78fd458d50141145790affe8c4e

    SHA512

    6235b56202191c591977023c6ed7c9ba85ca0bd99e4e12a3ed3e024bd403353af9c2207ec7c631a4aa75dc64edd1511157bd12796785b0484b780fc543faf449

  • \Program Files\Microsoft Office\Office14\VISSHE.DLL

    Filesize

    5.0MB

    MD5

    6bfa4f5b7dabfb7ce20fdeca7f2d10aa

    SHA1

    823bea5a9f75f0e5574541dd1ac65e8edf28d888

    SHA256

    ae3434351442a600150fdf003516ad2fa2db7139544f5b2d6a494321490d203e

    SHA512

    257ae3afd7bd1878065bae4b9a4168430b60bfb3587ff65635935d3561b88db448be3c239351941fcded71402be4f7f41a80a7e1be300d3e8ad0734961c4599f

  • memory/2268-6685-0x0000000000400000-0x0000000000883000-memory.dmp

    Filesize

    4.5MB