General

  • Target

    2025-03-30_8361fe24e0593d9a1415be1643477c9c_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

  • Size

    4.2MB

  • Sample

    250330-xqqnjaxky4

  • MD5

    8361fe24e0593d9a1415be1643477c9c

  • SHA1

    17bdf489a579251a25c6fd3a8a7627088ba36633

  • SHA256

    f82516763abff108242f5bfd4c65fa75f8977553a05e339ae992a2dab96a2a6e

  • SHA512

    cd550c959030547911d964f392f483b58a3f98efe33a9a306cf95f82d7a9a0c0441266d1ba3321fee4de044cb4c169bd93352df5a2a2ce1462dff9b37317f820

  • SSDEEP

    49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4k:ieF+iIAEl1JPz212IhzL+Bzz3dw/VK

Malware Config

Targets

    • Target

      2025-03-30_8361fe24e0593d9a1415be1643477c9c_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

    • Size

      4.2MB

    • MD5

      8361fe24e0593d9a1415be1643477c9c

    • SHA1

      17bdf489a579251a25c6fd3a8a7627088ba36633

    • SHA256

      f82516763abff108242f5bfd4c65fa75f8977553a05e339ae992a2dab96a2a6e

    • SHA512

      cd550c959030547911d964f392f483b58a3f98efe33a9a306cf95f82d7a9a0c0441266d1ba3321fee4de044cb4c169bd93352df5a2a2ce1462dff9b37317f820

    • SSDEEP

      49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4k:ieF+iIAEl1JPz212IhzL+Bzz3dw/VK

    • Gofing

      Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Gofing family

    • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.