Analysis Overview
SHA256
2c7d031ef96d259a86e4904ff89486a31fa40b3dcff4fe0c2aea7ab0d5296993
Threat Level: Known bad
The file 2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch was found to be: Known bad.
Malicious Activity Summary
Gofing
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
Gofing family
Renames multiple (51) files with added filename extension
Manipulates Digital Signatures
Drops file in Drivers directory
Reads user/profile data of web browsers
Credentials from Password Stores: Windows Credential Manager
Drops startup file
Loads dropped DLL
Drops desktop.ini file(s)
Drops Chrome extension
Drops autorun.inf file
Drops file in System32 directory
Drops file in Windows directory
Drops file in Program Files directory
Unsigned PE
Browser Information Discovery
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-05-19 14:10
Signatures
Gofing family
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-05-19 14:10
Reported
2025-05-19 14:13
Platform
win10v2004-20250502-en
Max time kernel
150s
Max time network
142s
Command Line
Signatures
Gofing
Gofing family
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Renames multiple (51) files with added filename extension
Drops file in Drivers directory
Manipulates Digital Signatures
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll | C:\Users\Admin\AppData\Local\Temp\2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch.exe | N/A |
| File created | C:\Windows\SysWOW64\wintrust.dll | C:\Users\Admin\AppData\Local\Temp\2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch.exe | N/A |
Credentials from Password Stores: Windows Credential Manager
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini | C:\Users\Admin\AppData\Local\Temp\2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Drops Chrome extension
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\manifest.json | C:\Users\Admin\AppData\Local\Temp\2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch.exe | N/A |
Drops desktop.ini file(s)
Drops autorun.inf file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf | C:\Users\Admin\AppData\Local\Temp\2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch.exe | N/A |
Drops file in System32 directory
Drops file in Program Files directory
Drops file in Windows directory
Browser Information Discovery
Processes
C:\Users\Admin\AppData\Local\Temp\2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch.exe
"C:\Users\Admin\AppData\Local\Temp\2025-05-19_825621cbc3b884970e76352b78687333_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| NL | 95.101.136.201:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 216.58.201.99:80 | c.pki.goog | tcp |
Files
C:\Program Files\7-Zip\7z.dll
| MD5 | f118408d1e6826488604d2a96133e7d8 |
| SHA1 | 98c5b55336d4f3f71f1b3f6d6912105c247106f0 |
| SHA256 | 8463b5f41417e1380fe44bde09770874f916baaf200b689bd069c628d6da73fc |
| SHA512 | 3327a6080f4cb1acc559c7e6add45dab6676cb87e289eab038ece93fb13341371a5df0b892ae3851301bb5585cb31bdd3dab12ad0b2eb83e3c5313687d37f42e |
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll
| MD5 | cd5152f6ca5ce2f38667f227c5eccfa3 |
| SHA1 | 8894779702153f14248c92b3b6ea5dc32c5988a9 |
| SHA256 | da4433d5c777bd2ba9507208bd47d539454be2d848c121c66e6e61a4491da314 |
| SHA512 | e35a6404dbcad1d2362eb600391ae9195a384ed601e38b047de9e504ef8750579390e34ea3e1b5adbdbaabb32675f8454971b6cfb006131dc83c54e2e9c731ed |
C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL
| MD5 | 99a536a444434edcdfbe699bfcfd4ee2 |
| SHA1 | 5e2b2487f9597a1adf5eb5199585e45d61c2f5b9 |
| SHA256 | 3570f939fbbcd54c551481ee7ff6bd5862ac89e192d2413657d3de079de3fad4 |
| SHA512 | e54b4ab924341b902a9cfb4ee8b7d35af4881573ddad9a4993c03be31f041242bdb599849a2e1da8cd5132fb8d9b48b7b681d2dce032207b408b0c9cb60e3b67 |