General

  • Target

    2025-04-03_444c646c911e16567fbbf1aac31755d9_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

  • Size

    4.1MB

  • Sample

    250403-1de8taxjz2

  • MD5

    444c646c911e16567fbbf1aac31755d9

  • SHA1

    f319c261ffac3fc3a46d6aee320bb267d0053ffe

  • SHA256

    db6d9a256bd4fab0f04c5cda37ea8d85edb1cd468e3793ceaf8d833afb6d587d

  • SHA512

    396e591a0c54452067083899aa0cb16017e160494cea8790ce427eddf5ebb558b5b44f2984ef0b866bbe2de6462ac05a9e2878ef018c815da9c347caa915ecca

  • SSDEEP

    49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4W:ieF+iIAEl1JPz212IhzL+Bzz3dw/VE

Malware Config

Targets

    • Target

      2025-04-03_444c646c911e16567fbbf1aac31755d9_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

    • Size

      4.1MB

    • MD5

      444c646c911e16567fbbf1aac31755d9

    • SHA1

      f319c261ffac3fc3a46d6aee320bb267d0053ffe

    • SHA256

      db6d9a256bd4fab0f04c5cda37ea8d85edb1cd468e3793ceaf8d833afb6d587d

    • SHA512

      396e591a0c54452067083899aa0cb16017e160494cea8790ce427eddf5ebb558b5b44f2984ef0b866bbe2de6462ac05a9e2878ef018c815da9c347caa915ecca

    • SSDEEP

      49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4W:ieF+iIAEl1JPz212IhzL+Bzz3dw/VE

    • Gofing

      Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Gofing family

    • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.