BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
54
Global rank
42
Month rank
30 infographic chevron week
Week rank
810
IOCs

Glupteba is a loader with information-stealing and traffic routing functionality. It is designed primarily to install other viruses on infected PCs but can do much more than that. In addition, it is being constantly updated, making this virus one to watch out for.

Loader
Type
Unknown
Origin
1 January, 2011
First seen
25 April, 2024
Last seen

How to analyze Glupteba with ANY.RUN

Type
Unknown
Origin
1 January, 2011
First seen
25 April, 2024
Last seen

IOCs

IP addresses
187.134.87.130
39.109.117.57
185.82.216.64
104.18.22.210
92.204.137.153
31.210.21.63
193.56.146.55
91.245.227.131
135.181.90.114
95.211.241.82
151.106.13.122
193.106.191.101
151.106.0.201
185.136.158.83
195.154.222.27
5.9.108.164
18.193.123.112
176.9.120.229
78.46.86.122
62.112.8.173
Hashes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cloudclust.com
clust-stats.com
clustkey.com
cloud-stats.com
clust-hosting.com
clusthost.com
dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
host-clust.com
financialtimesguru.com
clusthosting.com
clust-statistic.com
clust-host.com
cluststatistic.com
clustcloud.com
cluststats.com
hosting-clust.com
host-key.com
clust-key.com
clust-world.com
estrix.xyz
URLs
https://server1.realupdate.ru/api/poll
https://server1.realupdate.ru/api/restriction-us
https://server10.realupdate.ru/api/poll
https://server10.realupdate.ru/api/restriction-us
https://server14.realupdate.ru/api/poll
https://server14.realupdate.ru/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server14.realupdate.ru/api/restriction-us
https://server14.realupdate.ru/api/cdn
https://server13.realupdate.ru/api/restriction-us
https://server13.realupdate.ru/api/cdn
https://server7.thestatsfiles.ru/api/poll
https://server7.thestatsfiles.ru/api/signature/1bf850b4d9587c1017a75a47680584c4
https://server7.thestatsfiles.ru/api/signature/a4f5f1769e9bfd6c4510d7b73aa3332f
https://server7.thestatsfiles.ru/api/signature/dcb505dc2b9d8aac05f4ca0727f5eadb
https://server7.thestatsfiles.ru/api/restriction-us
https://server7.thestatsfiles.ru/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server7.thestatsfiles.ru/api/cdn
https://server12.realupdate.ru/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server12.realupdate.ru/api/restriction-us
https://server12.realupdate.ru/api/cdn
Last Seen at
Last Seen at

Recent blog posts

post image
Find Malware by File Contents with YARA Searc...
watchers 800
comments 0
post image
Cybercriminals Exploit Google Ads to Spread I...
watchers 383
comments 0
post image
New PowerShell Script Tracer: Analyze PowerSh...
watchers 684
comments 0

What is Glupteba malware?

Glupteba is a dropper — it is commonly used to install other malware samples on infected machines. Although it was initially thought that Glupteba was developed to be a part of a malicious campaign codenamed Operation Windigo, researchers now believe that it is independent malware.

Although Glupteba trojan classifies as a dropper it has some additional dangerous functions. For example, it has the ability to steal information from infected systems. In addition, it can download a component that is able to control routers and relay traffic.

Furthermore, it seems that this malware is under active development and creators employ dangerous and rarely used techniques to keep their creation active despite various malware removal programs. The reason is probably behind their presumable move to a pay-per-install distribution scheme which means that they must keep the malware relevant to profit from it.

General description of Glupteba dropper

Glupteba malware was first spotted in the wild in 2011 when it was distributed by TDL-4 bootkit among a series of other malware types. The virus went quite for a long time thanks to the malware removal tools until it surfaced again three years later. This time Glupteba was seen in Operation Windigo.

In addition, researchers discovered that command and control domains of Glupteba dropper were hosted on the same machines that powered parts of the Operation Windigo infrastructure. However, the exact connection between Glupteba and Windigo is unclear.

Until recently we didn’t hear much about Glupteba trojan anymore before it surfaced again carrying new, dangerous functionally.

Today, apart from the main dropper functionality Glupteba malware comes with two components: the browsers stealer component and the router exploiter.

The browser stealer comes in two versions that target Chrome, Opera, and the Yandex browser. The malware is capable of stealing cookies and browser history as well as private login credentials.

Then there is the router exploiter component. It exploits the CVE-2018-14847 vulnerability to take control of the routers. This allows attackers to turn compromised routers into SOCKS proxies, which redirect traffic from compromised machines. Thus, infected routers can become relay points for spam distribution and more.

For instance, there is a theory that some of the relayed traffic is part of an attack on Instagram, though it is impossible to tell for sure due to the HTTP encryption.

Malware analysis of Glupteba

The video generated by the ANY.RUN interactive malware hunting service shows the execution process of Glupteba. You can also analyze other malicious objects like Ave Maria and Smoke Loader.

process graph of the glupteba execution Figure 1: This graph generated by the ANY.RUN malware hunting service shows processes started by Glupteba Trojan

text report of the glupteba analysis Figure 2: A customizable text report created by ANY.RUN

Glupteba trojan execution process

After Glupteba makes its way into the system it's starts CMD.exe process to run CompMgmtLauncher.exe ("Computer Management Snapin Launcher"). The malware uses CompMgmtLauncher.exe to bypass UAC and run itself with administrative privileges. After that, it typically adds itself to autorun in the registry, renames an executable file and copies it to Windows subdirectories. Glupteba also checks the system for anti-malware solutions, adds firewall rules and defender exclusions. In addition to the above, this malware also adds itself to Schedule Tasks to persistence in the infected system. Throughout its lifecycle, Glupteba exchanges packets with the C2 server and has the ability to download other malware.

Glupteba C&C communication

Glupteba has a rather unique trick up its sleeve that involves no other than the Bitcoin blockchain. It can use transactions in the Bitcoin network to receive C&C domains. This function is triggered on schedule or by demand if there is a need.

It enables the attackers to pass new C&C domains to the malware, allowing it to restore operation by reconnecting to a new domain if something happens to the old one.

Glupteba malware distribution

It should be noted that Glupteba has a very wide distribution range. Since 2017 it has been spotted in 180 countries, though almost one-third of the attacks were concentrated in Ukraine, Russia, and Turkey.

In the past, the malware was distributed using the infrastructure provided by Windigo’s, however, currently, it is using its own botnet and employes CsdiMonetize adware. The latter downloads another dropper which, in turn, installs the trojan itself.

How to detect Glupteba using ANY.RUN?

Since Glupteba adds records into the registry, analysts can detect it by looking at registry keys. To do so, choose the process by clicking on it in the process tree of the task then click on the "More info" button. In "Advanced details of process" window switch to the "Registry changes" tab and take a closer look. If the analyzed sample writes a key with the name "UUID" into the key HKEY_CURRENT_USER\Software\Microsoft\TestApp, you are dealing with Glupteba and it's time to get the malware removal program ready.

how to detect glupteba Figure 3: Changes Glupteba made in the registry

Conclusion

Glupteba is proving to be a rather dangerous malware that researchers and cybersecurity specialists should not take lightly. Besides its ability to install other malware samples on infected machines, the malware is capable of stealing information from web browser applications. It can also download a component that reroutes traffic by taking control of web-routers.

We also know that this malware uses unique techniques when it comes to C&C communication. And if that was not enough, evidence suggests that it is in active development and attackers seem to be adding more potentially destructive features.

ANY.RUN has prepared a selection of advanced tools that allow to dissect and study a sample of Glupteba in an interactive sandbox environment which gives the researcher an ability to pause the simulation and make corrections at any time. Hopefully, by studying this threat along with many others we will be able to medicate the consensus of future malicious attacks.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy