Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 19:06

General

  • Target

    2025-03-30_5baf2c6dbc142c015b967226a9458f06_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    4.2MB

  • MD5

    5baf2c6dbc142c015b967226a9458f06

  • SHA1

    bc22f24e3b694a748c067816c11fba6557004e23

  • SHA256

    9c38ed5f117376d3308f58e8d0a1fa7914944250134ba581fd3a08b3a957e493

  • SHA512

    d9cea1233e4edc642668047ddce47bfb065391478a9a5e43278085e02a9cb285c3f221c05e743a8c59f436cbdd58d6fe5d64ea97983f11e363546dc95ae9ce0e

  • SSDEEP

    49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4R:ieF+iIAEl1JPz212IhzL+Bzz3dw/VP

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 2 IoCs
  • Renames multiple (52) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 22 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 45 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_5baf2c6dbc142c015b967226a9458f06_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_5baf2c6dbc142c015b967226a9458f06_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip.dll

    Filesize

    4.2MB

    MD5

    b0ebb1a19d56a83053cb5d4d846832f3

    SHA1

    4299bd056a11a90ec31f411fac79a9468473b4b6

    SHA256

    7612338b81f27fd539a2f293d42d780bc4c8e2dc04507ab0918849cc7945f997

    SHA512

    2bd7e30dedbd22a0fe164369632adbf85223ae3a99d543b46f941c2ea324e1783d169fa1260373b60a8b6563d8107b2ddbd31cef0f2b0497da09135c34b8388c

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    73be79acadbaba7a985d2a505c2bc58d

    SHA1

    ffdb9ac8517228fe73cd92f86b564e2565381426

    SHA256

    0dc5394be720cf96329c54b60f50d26158da7e41d9ab7f8e301dcf7c78770780

    SHA512

    77daddcc3c91a3c0e03bba2a50fcc2a98ad8b506946c246f200a08511b3bea894d0d52f7a57b0b64e0d00ec83f607ff3522036fc8dbe97031f5fe9585845e895