Analysis Overview
SHA256
78b0a0f2ba9434a0c5fbadf2026f7f354f1b1a78992c8187963f6689d3817c02
Threat Level: Known bad
The file 2025-05-02_5d951c92968ca21da3bf552e5841d5f2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch was found to be: Known bad.
Malicious Activity Summary
Gofing family
Gofing
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
Renames multiple (52) files with added filename extension
Reads user/profile data of web browsers
Credentials from Password Stores: Windows Credential Manager
Drops startup file
Loads dropped DLL
Drops desktop.ini file(s)
Drops Chrome extension
Drops file in System32 directory
Drops autorun.inf file
Drops file in Program Files directory
Drops file in Windows directory
Unsigned PE
Browser Information Discovery
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-05-02 10:07
Signatures
Gofing family
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-05-02 10:07
Reported
2025-05-02 10:10
Platform
win10v2004-20250314-en
Max time kernel
150s
Max time network
138s
Command Line
Signatures
Gofing
Gofing family
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Renames multiple (52) files with added filename extension
Credentials from Password Stores: Windows Credential Manager
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini | C:\Users\Admin\AppData\Local\Temp\2025-05-02_5d951c92968ca21da3bf552e5841d5f2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Drops Chrome extension
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\manifest.json | C:\Users\Admin\AppData\Local\Temp\2025-05-02_5d951c92968ca21da3bf552e5841d5f2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Drops desktop.ini file(s)
Drops autorun.inf file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf | C:\Users\Admin\AppData\Local\Temp\2025-05-02_5d951c92968ca21da3bf552e5841d5f2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Drops file in System32 directory
Drops file in Program Files directory
Drops file in Windows directory
Browser Information Discovery
Processes
C:\Users\Admin\AppData\Local\Temp\2025-05-02_5d951c92968ca21da3bf552e5841d5f2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
"C:\Users\Admin\AppData\Local\Temp\2025-05-02_5d951c92968ca21da3bf552e5841d5f2_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| DE | 142.250.185.131:80 | c.pki.goog | tcp |
Files
C:\Program Files\7-Zip\7-zip32.dll
| MD5 | 6ef6a3830a6729ab9f620785a843e49f |
| SHA1 | 54f39a1d0dc32b6eaaaa6f931f7f9bbcf3e06c06 |
| SHA256 | 66dc93daca350cf4381a473c4e31a3dd4df515766205ad9cebe461e4e12e58c4 |
| SHA512 | 6ebeeb7b6bd69ac6867695c002e0b8245d0bec55934947905d53958d2aace48f3d16e0aaa1d69457b5a1ddeec6d301981bc9bdd1b24196fca6e7108e512fa2b8 |
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll
| MD5 | 2b5fe291adec8a3e4b22d8e88c0a1c5f |
| SHA1 | 968b6a02d93345cc7d329701203f688dcb45dae6 |
| SHA256 | 62786e48db8e2b8c44ca778eeced3c331797e26f48072b0ca7a6c8e0ef31ea9c |
| SHA512 | e6ddde91e078a71b842f73f3cd95b693db7d4a4bdf3901e48781d129a21af68e13c5789c1a9f94a407630eda10e8095b07d0bafa3ed21a427ccb05545f416380 |
C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL
| MD5 | 587f2836341f341971b2ed6fce765eaa |
| SHA1 | d3a9d2a8d9f2e506640547ebee254269c2685148 |
| SHA256 | 81ab89211535fa83d0a478311c2fc4f430936aff3456d9b66ee5344865834274 |
| SHA512 | 10a623ffaa51f929fb1f69229a99630ae1845152cd08b810bbcf6c6b0866f91235a3e9d749bb8bca5811e5ca04ceedb05d15c43054af33ec2c7925df8dbb601f |