Analysis

  • max time kernel
    139s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 20:30

General

  • Target

    2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    58659314078ad8f3618f4a83b02ed315

  • SHA1

    16df4116b0c2b9d2456d91d0ff50eb6a3ba63d3b

  • SHA256

    34720b235554d097029b0453b57508df822a2b24476ffc6067d018f55288ec3a

  • SHA512

    4f977e03c7044d05b3b224d9139d24ec26c53f0bd17ba54e37093b69522fc2a76b96f615fc5e558761389d12b9f9e59d1d160781754bad415c600c9c11f8b543

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VjeXxnudOB:pWvSDzaxztQViXxn/B

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 2 IoCs
  • Drops file in Drivers directory 39 IoCs
  • Manipulates Digital Signatures 3 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 27 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\PidGenX.dll

    Filesize

    5.3MB

    MD5

    ad3be240ae4f9ed9a978889b6c143f6b

    SHA1

    3942364ec82c64d2f5c37139c819eec4ea3bd045

    SHA256

    b5f8a635f80105096652aa1e83ebbf510aaa2af0789505b2c27fc7d4d1283bdc

    SHA512

    9a25f6dcea767ba00ffd4b860dcb15a76f07ba54c5a42ad73e57d4d3051d69b62093a4db3912ca635c7246577ba6422b82a8303a4032137e05700fe13b86ba1f

  • \Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll

    Filesize

    5.3MB

    MD5

    dae8f6b3ffca1cb3952b4ba71ae2bf24

    SHA1

    5a894a61730dcbe57f9864b93d940c211ec618f6

    SHA256

    3f83801b5eda8002ec725766046acc2c7e009d09d76168b7e4611f6be5b39865

    SHA512

    c4b219f6e626d699cb32fd33d3e3269b23c7e83d4e9a7eef45af2943acb94dad5dd84d717cf612235bbc065b0b32e8293b5ad438bb8fba0f7b7da63de8059213