Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 20:36

General

  • Target

    2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    58659314078ad8f3618f4a83b02ed315

  • SHA1

    16df4116b0c2b9d2456d91d0ff50eb6a3ba63d3b

  • SHA256

    34720b235554d097029b0453b57508df822a2b24476ffc6067d018f55288ec3a

  • SHA512

    4f977e03c7044d05b3b224d9139d24ec26c53f0bd17ba54e37093b69522fc2a76b96f615fc5e558761389d12b9f9e59d1d160781754bad415c600c9c11f8b543

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VjeXxnudOB:pWvSDzaxztQViXxn/B

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 3 IoCs
  • Drops file in Drivers directory 39 IoCs
  • Manipulates Digital Signatures 3 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\PidGenX.dll

    Filesize

    5.3MB

    MD5

    3ff0b67ecd8ff4e9786653b1eaea1d21

    SHA1

    f2d11931e04a584234660da04b117bbc5a82e7bc

    SHA256

    4688dbf6f78cd362956ba9d7523a46f844af295a449fc741437e15d0f61301af

    SHA512

    b2e96347e41c3beda1bf9786923f8524dce70d03cecbf09ef3ba3da2c4a25d00472c7f9a538785f32e5e59115cfbb461c4de9395c0baa1950ae50ce969716df1

  • \Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll

    Filesize

    5.3MB

    MD5

    96732ff973121874e7c2df945b6d574e

    SHA1

    e0484632448754e03b270bdde62448fa014418b0

    SHA256

    e744f9a682237b1873b4162d39b3a47b83ec3f5cfce1cd7e1ae02e5986fe347c

    SHA512

    acb84c61bf8f89f6c183305c3b3ad70bf1ac5cf2a5d14a60bcb6a18d9453b85f9930ac0fc2e4609c47d54c76b1821f7f06f9c48ba0a1bcbc98e2d962ac609dee

  • \Program Files\Microsoft Office\Office14\VISSHE.DLL

    Filesize

    5.0MB

    MD5

    d8bd7cb47aec7a0927bc0c22be09064e

    SHA1

    5fe0eb77b26a12460f44ca3ae067fb2dd33c49fa

    SHA256

    e7d1cda8c4cf12afb5f3c7801ced0bcc3abf924e927cdfe489e953a811dcaa8f

    SHA512

    f8d35165a9a220607b985e6905c7021f0a5df9c447bb37d80067d4c317d4ae0c666f36ec69f9dffa56587664021b69a06b44eb6b99d8118c7badb1912d6bb725