Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
88
Global rank
111 infographic chevron month
Month rank
124 infographic chevron week
Week rank
0
IOCs

Glupteba is a loader with information-stealing and traffic routing functionality. It is designed primarily to install other viruses on infected PCs but can do much more than that. In addition, it is being constantly updated, making this virus one to watch out for.

Loader
Type
Unknown
Origin
1 January, 2011
First seen
26 October, 2025
Last seen

How to analyze Glupteba with ANY.RUN

Type
Unknown
Origin
1 January, 2011
First seen
26 October, 2025
Last seen

IOCs

IP addresses
187.134.87.130
185.82.216.64
104.18.22.210
92.204.137.153
80.93.90.32
80.93.90.78
46.165.249.195
80.93.90.69
178.162.193.86
178.162.193.66
37.48.81.151
46.165.249.167
80.93.90.84
89.163.206.137
89.163.212.9
78.31.67.205
178.162.193.195
80.93.90.27
213.202.254.161
212.92.100.115
Hashes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server9.ninhaine.com
12f9f8f0-e24d-4d0d-9273-e2e46fa86931.server4.nisdably.com
server11.ninhaine.com
ww25.198c0529-1ea6-483a-8a2e-66d8df595657.server2.ninhaine.com
server14.ninhaine.com
server7.nisdably.com
server6.ninhaine.com
server11.nisdably.com
server9.cdneurops.buzz
ww25.5d8fd57c-62b0-48f1-b595-796cb6b6e7f4.server2.ninhaine.com
5d8fd57c-62b0-48f1-b595-796cb6b6e7f4.server4.nisdably.com
c46ad61e-137f-4726-8068-89ea6faa468d.server4.nisdably.com
ww25.dfe03de9-5d5d-4ecc-9423-14b8f289583d.server1.ninhaine.com
server13.ninhaine.com
burnandfire5.com
server5.nisdably.com
financialtimesguru.com
ww25.43ce3452-222d-4023-ab1b-980d96f5fe5b.server1.ninhaine.com
dfe03de9-5d5d-4ecc-9423-14b8f289583d.server3.ninhaine.com
server11.cdneurop.cloud
URLs
https://server3.mastiakele.xyz/api/cdn
https://server3.mastiakele.xyz/api/signature/dcb505dc2b9d8aac05f4ca0727f5eadb
https://server3.mastiakele.xyz/api/signature/7507ffc9a340f774985cb5ca11ca78c4
https://server3.mastiakele.xyz/api/poll
https://server3.mastiakele.xyz/api/restriction-us
https://server3.mastiakele.xyz/api/signature/2dbc44aae677e2661475da5b2a3aac2e
https://server3.mastiakele.xyz/api/signature/1bf850b4d9587c1017a75a47680584c4
https://server13.zaoshang.ooo/api/poll
https://server13.zaoshang.ooo/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server13.zaoshang.ooo/api/cdn
https://server13.zaoshang.ooo/api/restriction-us
https://server10.zaoshang.ooo/api/cdn
https://server10.zaoshang.ooo/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server10.zaoshang.ooo/api/restriction-us
https://server10.zaoshang.ooo/api/poll
https://server6.zaoshang.ooo/api/poll
https://server9.zaoshanghaoz.net/api/cdn
https://server9.zaoshanghaoz.net/api/restriction-us
https://server9.zaoshanghaoz.net/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server12.realupdate.ru/api/restriction-us
Last Seen at
Last Seen at

Recent blog posts

post image
Release Notes: ANY.RUN & ThreatQ Integrat...
watchers 100
comments 0
post image
What is a Malware Sandbox? Everything SOC Ana...
watchers 458
comments 0
post image
Major Cyber Attacks in October 2025: Phishing...
watchers 3221
comments 0

What is Glupteba malware?

Glupteba is a dropper — it is commonly used to install other malware samples on infected machines. Although it was initially thought that Glupteba was developed to be a part of a malicious campaign codenamed Operation Windigo, researchers now believe that it is independent malware.

Although Glupteba trojan classifies as a dropper it has some additional dangerous functions. For example, it has the ability to steal information from infected systems. In addition, it can download a component that is able to control routers and relay traffic.

Furthermore, it seems that this malware is under active development and creators employ dangerous and rarely used techniques to keep their creation active despite various malware removal programs. The reason is probably behind their presumable move to a pay-per-install distribution scheme which means that they must keep the malware relevant to profit from it.

General description of Glupteba dropper

Glupteba malware was first spotted in the wild in 2011 when it was distributed by TDL-4 bootkit among a series of other malware types. The virus went quite for a long time thanks to the malware removal tools until it surfaced again three years later. This time Glupteba was seen in Operation Windigo.

In addition, researchers discovered that command and control domains of Glupteba dropper were hosted on the same machines that powered parts of the Operation Windigo infrastructure. However, the exact connection between Glupteba and Windigo is unclear.

Until recently we didn’t hear much about Glupteba trojan anymore before it surfaced again carrying new, dangerous functionally.

Today, apart from the main dropper functionality Glupteba malware comes with two components: the browsers stealer component and the router exploiter.

The browser stealer comes in two versions that target Chrome, Opera, and the Yandex browser. The malware is capable of stealing cookies and browser history as well as private login credentials.

Then there is the router exploiter component. It exploits the CVE-2018-14847 vulnerability to take control of the routers. This allows attackers to turn compromised routers into SOCKS proxies, which redirect traffic from compromised machines. Thus, infected routers can become relay points for spam distribution and more.

For instance, there is a theory that some of the relayed traffic is part of an attack on Instagram, though it is impossible to tell for sure due to the HTTP encryption.

Malware analysis of Glupteba

The video generated by the ANY.RUN interactive malware hunting service shows the execution process of Glupteba. You can also analyze other malicious objects like Ave Maria and Smoke Loader.

process graph of the glupteba execution Figure 1: This graph generated by the ANY.RUN malware hunting service shows processes started by Glupteba Trojan

text report of the glupteba analysis Figure 2: A customizable text report created by ANY.RUN

Glupteba trojan execution process

After Glupteba makes its way into the system it's starts CMD.exe process to run CompMgmtLauncher.exe ("Computer Management Snapin Launcher"). The malware uses CompMgmtLauncher.exe to bypass UAC and run itself with administrative privileges. After that, it typically adds itself to autorun in the registry, renames an executable file and copies it to Windows subdirectories. Glupteba also checks the system for anti-malware solutions, adds firewall rules and defender exclusions. In addition to the above, this malware also adds itself to Schedule Tasks to persistence in the infected system. Throughout its lifecycle, Glupteba exchanges packets with the C2 server and has the ability to download other malware.

Glupteba C&C communication

Glupteba has a rather unique trick up its sleeve that involves no other than the Bitcoin blockchain. It can use transactions in the Bitcoin network to receive C&C domains. This function is triggered on schedule or by demand if there is a need.

It enables the attackers to pass new C&C domains to the malware, allowing it to restore operation by reconnecting to a new domain if something happens to the old one.

Glupteba malware distribution

It should be noted that Glupteba has a very wide distribution range. Since 2017 it has been spotted in 180 countries, though almost one-third of the attacks were concentrated in Ukraine, Russia, and Turkey.

In the past, the malware was distributed using the infrastructure provided by Windigo’s, however, currently, it is using its own botnet and employes CsdiMonetize adware. The latter downloads another dropper which, in turn, installs the trojan itself.

How to detect Glupteba using ANY.RUN?

Since Glupteba adds records into the registry, analysts can detect it by looking at registry keys. To do so, choose the process by clicking on it in the process tree of the task then click on the "More info" button. In "Advanced details of process" window switch to the "Registry changes" tab and take a closer look. If the analyzed sample writes a key with the name "UUID" into the key HKEY_CURRENT_USER\Software\Microsoft\TestApp, you are dealing with Glupteba and it's time to get the malware removal program ready.

how to detect glupteba Figure 3: Changes Glupteba made in the registry

Conclusion

Glupteba is proving to be a rather dangerous malware that researchers and cybersecurity specialists should not take lightly. Besides its ability to install other malware samples on infected machines, the malware is capable of stealing information from web browser applications. It can also download a component that reroutes traffic by taking control of web-routers.

We also know that this malware uses unique techniques when it comes to C&C communication. And if that was not enough, evidence suggests that it is in active development and attackers seem to be adding more potentially destructive features.

ANY.RUN has prepared a selection of advanced tools that allow to dissect and study a sample of Glupteba in an interactive sandbox environment which gives the researcher an ability to pause the simulation and make corrections at any time. Hopefully, by studying this threat along with many others we will be able to medicate the consensus of future malicious attacks.

HAVE A LOOK AT

Meduza Stealer screenshot
Meduza Stealer is an information-stealing malware primarily targeting Windows systems, designed to harvest sensitive data such as login credentials, browsing histories, cookies, cryptocurrency wallets, and password manager data. It has advanced anti-detection mechanisms, allowing it to evade many antivirus programs. The malware is distributed through various means, including phishing emails and malicious links. It’s marketed on underground forums and Telegram channels.
Read More
Cobalt Strike screenshot
Cobalt Strike
cobaltstrike
Cobalt Strike is a legitimate penetration software toolkit developed by Forta. But its cracked versions are widely adopted by bad actors, who use it as a C2 system of choice for targeted attacks.
Read More
Phorpiex screenshot
Phorpiex
phorpiex
Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Orcus RAT screenshot
Orcus RAT
orcus rat trojan
Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.
Read More
Spyware screenshot
Spyware
spyware
Spyware is a stealth form of malware whose primary objective is to gather sensitive information, such as personal data, login credentials, and financial details, by monitoring user activities and exploiting system vulnerabilities. Spyware operates secretly in the background, evading detection while transmitting collected data to cybercriminals, who can then use it for malicious purposes like identity theft, financial fraud, or espionage.
Read More