Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2025, 16:48

General

  • Target

    2025-04-03_1d40706819c72f1578abd58ed3daf0b2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    4.2MB

  • MD5

    1d40706819c72f1578abd58ed3daf0b2

  • SHA1

    46f1d8ac7baebed5643a4009cc9451516990a1a3

  • SHA256

    9efa07b08a743790daa29e1c7c98aef0fe7ae82a7bdf8000f8902ef0f3db0a93

  • SHA512

    8ac0f82b8caa73351344a671572b55b0843e8ef21763f87bae3bb6973fe8cb5692dc3fd5b69c990479b789b22e63aead8cb29eec618a69a8966f5fd37d149a38

  • SSDEEP

    49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4y:ieF+iIAEl1JPz212IhzL+Bzz3dw/VM

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 3 IoCs
  • Renames multiple (54) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 22 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 54 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-03_1d40706819c72f1578abd58ed3daf0b2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-03_1d40706819c72f1578abd58ed3daf0b2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip.dll

    Filesize

    4.2MB

    MD5

    359eb3a1ab93f39cf1c3536487f6019e

    SHA1

    b702b56b1f86cc0df42a06f9ac99aefff2df774c

    SHA256

    3542c31fb88d0263cd50435bfa5996e6ab1c8ba2492880449d82a2db3b7eef1c

    SHA512

    8b71b672871d3444eeb34d43c3e9a23265dc1e0f3c58cd364ff048cb8bc3a7c7d991de72641d1cb0973c77578252e6a9c10c70a047b6cb30fdfc2a105197d131

  • C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL

    Filesize

    4.4MB

    MD5

    94d16fff47e904fa0147f705628b6df5

    SHA1

    fab458b767778a6b06ff03f516a6f26d3fa6a9b4

    SHA256

    7b553bece675b31f98af6003d6fa9343db887422fd06e9394520b42cb7f6f94f

    SHA512

    6d1467f4f139535e9b6bf649955ebba4338093acb59d49b422402c6070ae7d54267e07be98d8833684fe942425574e1dba880ad1bdc865caec9ce6f2f28137a2

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    4bc7aeb0c40c1238dc4c470c1eeb1df7

    SHA1

    cf108472afddec7cf1cc328dc9941a3854b0910c

    SHA256

    4903711b2016cfec37dad949515f51aadb747b1202418ef1f3638db96d434df2

    SHA512

    24f40485e87c6cbc87a55f07fa813e97672e041623fff87234c2205ce0bd7d6cbd1851224ec592c8b984118f1caf9e04c31a0fca2c61154540e4b7e831ddcd66