Managed XDR
Group-IB MDP Report
File info
Filename: home-petik-ss-malware-2025-10-04_ccd8a4553baff942a6d1be68ab7822be_cobalt-strike_frostygoop_ghostlocker_gofing_luca-stealer_sliver_snatch
File Type: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
File Size: 4.2 MB
Env info
win7/x64 en
Hashes
SHA1: 33428fb9736433b476a781e2b6ffac1f7a1df729
SHA256: e59babba814e9ebc787decbec52f7f83123d3aed0c0f56f4ec6da52f90e13ac0
MD5: ccd8a4553baff942a6d1be68ab7822be
Signatures
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access
T1503 infostealer_browser: Retrieves personal information from local Internet browsers
T1552 infostealer_browser: Retrieves personal information from local Internet browsers
T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
T1555.004 windows_credential_manager: Acquire credentials from the Windows Credential Manager
Discovery
T1083 crawls_directories: Opens a huge number of directories all over disk C: (possibly, searches for sensitive data)
T1518 locates_browser: Attempts to identify where browsers are installed
Collection
T1074.001 access_recyclebin: Manipulation with recyclebin detected
Other
yara_rules: Static rules
creates_exe: Creates executable files in the file system
creates_der: Creates a certificate file (DER)
creates_doc: Creates (office) documents in the file system
creates_in_programdata: Creates files in the ProgramData directory
writes_data: Writes big amount of data to disk
pe_overlay: PE file contains overlay
Managed XDR