General

  • Target

    2025-03-30_838f5955df08d61333f8815820c1de90_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

  • Size

    4.2MB

  • Sample

    250330-xqvbqaxky5

  • MD5

    838f5955df08d61333f8815820c1de90

  • SHA1

    9b43bc2d7cac1c2d08dea1ef544269b03320d296

  • SHA256

    e2198eaedc65a878e9d041392c638639df825baed523a9d491cc7532b373365b

  • SHA512

    d01a61363e121c66241a41b09c1596ca79ad1fb12a46647a67c7d8fce2aec73ee15a1fdde8ad187d08177a7f29da2442896f8d3d9cd40f988b08a68624f4c231

  • SSDEEP

    49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4/:ieF+iIAEl1JPz212IhzL+Bzz3dw/V1

Malware Config

Targets

    • Target

      2025-03-30_838f5955df08d61333f8815820c1de90_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

    • Size

      4.2MB

    • MD5

      838f5955df08d61333f8815820c1de90

    • SHA1

      9b43bc2d7cac1c2d08dea1ef544269b03320d296

    • SHA256

      e2198eaedc65a878e9d041392c638639df825baed523a9d491cc7532b373365b

    • SHA512

      d01a61363e121c66241a41b09c1596ca79ad1fb12a46647a67c7d8fce2aec73ee15a1fdde8ad187d08177a7f29da2442896f8d3d9cd40f988b08a68624f4c231

    • SSDEEP

      49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4/:ieF+iIAEl1JPz212IhzL+Bzz3dw/V1

    • Gofing

      Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Gofing family

    • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.