Analysis Overview
SHA256
8070e3ff42493652d57578555295648a86c0d4b2ad1bc5dc64d3a00ad7bc11f5
Threat Level: Known bad
The file 2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch was found to be: Known bad.
Malicious Activity Summary
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
Gofing
Gofing family
Manipulates Digital Signatures
Drops file in Drivers directory
Executes dropped EXE
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Credentials from Password Stores: Windows Credential Manager
Drops desktop.ini file(s)
Drops Chrome extension
Drops file in System32 directory
Drops autorun.inf file
Drops file in Windows directory
Drops file in Program Files directory
Unsigned PE
Browser Information Discovery
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-05-03 14:42
Signatures
Gofing family
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-05-03 14:42
Reported
2025-05-03 14:45
Platform
win10v2004-20250502-en
Max time kernel
150s
Max time network
106s
Command Line
Signatures
Gofing
Gofing family
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Drivers directory
Manipulates Digital Signatures
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
| File created | C:\Windows\SysWOW64\wintrust.dll | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Credentials from Password Stores: Windows Credential Manager
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Drops Chrome extension
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\manifest.json | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Drops desktop.ini file(s)
Drops autorun.inf file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Drops file in System32 directory
Drops file in Program Files directory
Drops file in Windows directory
Browser Information Discovery
Processes
C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
"C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| DE | 142.250.184.195:80 | c.pki.goog | tcp |
Files
C:\Program Files\7-Zip\7-zip.dll
| MD5 | 022a32bf7d7dbe4bb14b5dfb0f035b76 |
| SHA1 | fbb176f573905b275c53db76e0a1b4bc758fd4de |
| SHA256 | 329ae4c4a597243bb4c1c703a6910a0491007c084fe448f70e8afd8e3de53c5b |
| SHA512 | 4982c7a83ed9f4abf2b40e0047d6e4962cb5d2a1c8c054c3e10319794d7c76994b512f2769a595e154fc0536e6ed3302a8d2a2826f8cef4895fa83468f8a991b |
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll
| MD5 | c00fc04be3bfa535ccea20af4c7dbe05 |
| SHA1 | 3efd34639dd6503e8790fc86a73896970103726b |
| SHA256 | 6aceb2d43f0c12bb72dba7fb6b7469c42dfd3dbce03fad7992ce5c9c09d2adf3 |
| SHA512 | 64d7b2b8cbd804d66aba946a46e2e50f23313a1e5027b8bf0c04060183657a8d4c51b928e96a3033dd086b7bc6eda8e47db15a44a0b6350479177f690b82ac9c |
C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL
| MD5 | 6d6aee57362c1988c07770448c52f7eb |
| SHA1 | 3ca1dbafea44f31a557e7c9991fd9319b8969829 |
| SHA256 | d45d3020d887369f38ccb7c8263b214efdc0de3f82b3df31f08a244f24888b71 |
| SHA512 | 16462271615b473236e89e0de56d1f472a4826b5ef36b8cedcbcc0a77b8fbdf46c3902b3030842da22702570062bfef8b821efe82655d0cc399af6bf998bcd2e |
Analysis: behavioral2
Detonation Overview
Submitted
2025-05-03 14:42
Reported
2025-05-03 14:45
Platform
win11-20250502-en
Max time kernel
150s
Max time network
106s
Command Line
Signatures
Gofing
Gofing family
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Drivers directory
Manipulates Digital Signatures
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
| File created | C:\Windows\SysWOW64\wintrust.dll | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Credentials from Password Stores: Windows Credential Manager
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Drops Chrome extension
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\manifest.json | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Drops desktop.ini file(s)
Drops autorun.inf file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf | C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe | N/A |
Drops file in System32 directory
Drops file in Program Files directory
Drops file in Windows directory
Browser Information Discovery
Processes
C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
"C:\Users\Admin\AppData\Local\Temp\2025-05-03_500c1f0c268f093905a1842bd4336a70_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
Network
Files
C:\Program Files\7-Zip\7z.dll
| MD5 | f9d542c93f55031e444591c494ff0cb4 |
| SHA1 | dbde3eae92729690358cbe61bf3f4345f35c6d97 |
| SHA256 | e8e1a8cba256d968a0afea94874e5eb551ee7521d7f139af6e495cfcbc583f5c |
| SHA512 | fab89affaa76ae5ec14b96835c5f4219404f3ca6aedc570208fe75f6b2227c5b87e0388c2132f1b57a1dee53bb68ba05d3d1fd54e0d6265d3202cb62c640ac37 |
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll
| MD5 | 3dba7f631f4dd3e9e971becb13ca0245 |
| SHA1 | d5427ca009e10e2bdaa324e2f68f9a12830fee95 |
| SHA256 | 365647bc6f0fb57ba5b0a714e9cad35511ecc5a558d1d6eae911dcb85bdde87b |
| SHA512 | 0bcf7b77604f55c6ee46e9744bb8ead5672d2cd1244a358ceb611e7daa29624a5cd356369c33fe2259ae5313198d3878aa0e34ab4e6108cfbe87187c05fff088 |
C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL
| MD5 | 11fbaf8df21beb2fcd9cb65ab47973e9 |
| SHA1 | 4ce1203e13cc2061ee33bfa3e87d1e82a2f22f2e |
| SHA256 | 02de471f6c9415fad15aee7bd609f704b25d84a3b7dc445e932567dfcf7fbdc7 |
| SHA512 | ca8556798a87915b46d79e6abf8c23250486646d3146d48c7f892c2223dc0288d796ee7a1044299bcd60519d1f66afd38d367a2d0773ea5ff578aac30efafde0 |