Analysis

  • max time kernel
    150s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2025, 17:12

General

  • Target

    2025-04-03_a9cb3ffafd0621b1d7c45883c646ae81_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.1MB

  • MD5

    a9cb3ffafd0621b1d7c45883c646ae81

  • SHA1

    94b72cc4955e71e818e924706141665b2ecdf8d6

  • SHA256

    b1176f3e2aae5b1755cc63bf9faa424d6b32258637c6635d9feee26b583e1091

  • SHA512

    b5d22f8e629c20f0fb6ee936db3f861226f5da2dd69fcbc85055e6232a86f7fed702fb89f5ef07796b4f46aac382d15cf69a2b27e7ebeb64b2679f21cbe4e008

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VurbTGiYch1Ymn:pWvSDzaxztQVQqch19

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 3 IoCs
  • Renames multiple (52) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 22 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-03_a9cb3ffafd0621b1d7c45883c646ae81_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-03_a9cb3ffafd0621b1d7c45883c646ae81_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip.dll

    Filesize

    4.2MB

    MD5

    147e84dae79e4fb11d1f39faf2fba407

    SHA1

    38ea3ce25945805f73c7adbcbc2450005b89f4ce

    SHA256

    48903823a759e46172916c19d7ebf8fd001e18c6c9b97e0195468614cc34cc49

    SHA512

    b4828fbe6acf98af83a5b6749b04d1df0d32d14d559566cc9a3d8b4f5894bdf64e951e4c32a612141fb88a93affd00dd08fb754e416975e6f90c5bf3e46a572e

  • C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL

    Filesize

    4.4MB

    MD5

    dc1181dfda263c75a27c4a7f9a862c78

    SHA1

    f2a8621b10302f92564777e3e403aa416c127d54

    SHA256

    015441f5b06547b8f68176bb6b4d155aec700b13bd1b85d267cb76ca48e2a439

    SHA512

    631ecfc4ca539f8119669851d3d7b44e70ea6fe11663c6c500dd2ef4e25a48f25cceef1f5e62ba4ae8f0eb9519b221013dcddf405f178b6889a76c230626ef9a

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    42e7479fda7133ab9d0b129a106b78d0

    SHA1

    47df025a5b58c37e2f3f121a144bf8a4143c8233

    SHA256

    28dff93ca906dfa89137a3c0dfd9c2d2cb9e92aa889c2223fa7c5435d0d00b9f

    SHA512

    c04f6979ce657fc930d9e0db8d5b48c39c7c0b09e0ede3a42b99a8bd180949f0aa972be0dd6c6a1ed8aa39cbfa7d291c246f71dfb999f71a3f1626325e477543