Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 20:36

General

  • Target

    2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    58659314078ad8f3618f4a83b02ed315

  • SHA1

    16df4116b0c2b9d2456d91d0ff50eb6a3ba63d3b

  • SHA256

    34720b235554d097029b0453b57508df822a2b24476ffc6067d018f55288ec3a

  • SHA512

    4f977e03c7044d05b3b224d9139d24ec26c53f0bd17ba54e37093b69522fc2a76b96f615fc5e558761389d12b9f9e59d1d160781754bad415c600c9c11f8b543

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VjeXxnudOB:pWvSDzaxztQViXxn/B

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 3 IoCs
  • Drops file in Drivers directory 22 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_58659314078ad8f3618f4a83b02ed315_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:3244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip.dll

    Filesize

    4.2MB

    MD5

    25e66ba717101bedd0be0e4427f2c5b7

    SHA1

    0b9944219de092f149df0721e620b5f7128aa47f

    SHA256

    5d6de80e0b86f51c7f99c84971a80bf6fa8c3d60e5320b06a86532737316a01f

    SHA512

    98e477d5700a5020fc4036d3529922977232bea67ce9bbef5f099eb07de92463cc1b5280cad051f4589a2754ba43424f77a7e2a2e1128256788436467c4e333d

  • C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL

    Filesize

    4.4MB

    MD5

    35cb29898fada3e51f3fec0dfd70448a

    SHA1

    7e556b7b71107bbbe2598578054ff05361e2e677

    SHA256

    459b8069b2d40363f8500f78f74f7bb7a021de157ccfe1f1f813524250e6d9e1

    SHA512

    6101929e3e74ab880690c45b3b1e86cbcad030d045f94222aef19d40240692f124965c62e394f263672b2b58971c8a067d8ebc05fd32f44324d1daf5346727e8

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    08cd4458708f496b28eea8be040f3fb5

    SHA1

    29b17ea1e4d4b641fbc905270b915833a3cac88e

    SHA256

    fb1c7d96206e4e1eb4f4279dd27e4b8eb621e0300a2e04edb551383ef74dc51d

    SHA512

    5f2f9147a9654268e34f4437d95af2c023c92363b84cf900d7e0336819b22264e7476bc11dbc2b2e476959e87a3b2cf1db707c4c9971727402c5ee25b6cf1796