General

  • Target

    2025-04-03_79fce34b73e88d8ab79381b368b78992_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

  • Size

    5.9MB

  • Sample

    250403-x8xvkavqt7

  • MD5

    79fce34b73e88d8ab79381b368b78992

  • SHA1

    5ff2232f98009acbfc3aa3b1c6502850ebe66a2c

  • SHA256

    cbd78527162c08cf8362bae78070ddae9d48b22fdbd738553aad1dd9799e6330

  • SHA512

    29660aa825a9cb690e26dc501648fd7eeb5a70ddd26a0f2bd3654b887374419381a1e2d51eca67d9f7f2bffc7a2b1048134b1395c389d5665aa5dc711185fb59

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VczlwLP9pR3p:pWvSDzaxztQVcz81pR3p

Malware Config

Targets

    • Target

      2025-04-03_79fce34b73e88d8ab79381b368b78992_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch

    • Size

      5.9MB

    • MD5

      79fce34b73e88d8ab79381b368b78992

    • SHA1

      5ff2232f98009acbfc3aa3b1c6502850ebe66a2c

    • SHA256

      cbd78527162c08cf8362bae78070ddae9d48b22fdbd738553aad1dd9799e6330

    • SHA512

      29660aa825a9cb690e26dc501648fd7eeb5a70ddd26a0f2bd3654b887374419381a1e2d51eca67d9f7f2bffc7a2b1048134b1395c389d5665aa5dc711185fb59

    • SSDEEP

      98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VczlwLP9pR3p:pWvSDzaxztQVcz81pR3p

    • Gofing

      Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Gofing family

    • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.