BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
55
Global rank
56 infographic chevron month
Month rank
35 infographic chevron week
Week rank
871
IOCs

Glupteba is a loader with information-stealing and traffic routing functionality. It is designed primarily to install other viruses on infected PCs but can do much more than that. In addition, it is being constantly updated, making this virus one to watch out for.

Loader
Type
Unknown
Origin
1 January, 2011
First seen
25 July, 2024
Last seen

How to analyze Glupteba with ANY.RUN

Type
Unknown
Origin
1 January, 2011
First seen
25 July, 2024
Last seen

IOCs

IP addresses
187.134.87.130
185.82.216.64
104.18.22.210
92.204.137.153
195.2.70.38
135.181.90.114
77.238.229.63
193.106.191.101
91.142.74.28
18.193.123.112
95.211.241.82
151.106.0.201
62.112.8.173
185.136.158.83
77.238.245.11
83.149.126.1
151.106.13.122
195.154.222.27
78.46.86.122
5.9.108.164
Hashes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rustmacro.ru
porompa.xyz
hotbooks.xyz
bidar.xyz
ostdownload.xyz
brokenlegz.top
x4l2doee6uhhf3lqjvjodgqtxsjvwbkdqyldhwyhwkhf4y23aqq7jayd.onion
novyiperec.xyz
sleepingcontrol.com
getfixed.xyz
mastiakele.ae.org
r5vg4h5rlwmo6oa3p3vlckuvf5na2wb2tnqbsbkivhrhlyze6czlpjad.onion
carcamera.xyz
playfire.online
iceanedy.com
bigtext.club
0df.ru
woproperty.xyz
gfixprice.xyz
portmdfmoon.com
URLs
https://server15.thestatsfiles.ru/api/poll
https://server15.thestatsfiles.ru/api/restriction-us
https://server15.thestatsfiles.ru/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server15.thestatsfiles.ru/api/cdn
https://server2.dumperstats.org/api/poll
https://server2.dumperstats.org/api/restriction-us
https://server2.dumperstats.org/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server2.dumperstats.org/api/cdn
https://server9.thestatsfiles.ru/api/poll
https://server9.thestatsfiles.ru/api/restriction-us
https://server9.thestatsfiles.ru/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server9.thestatsfiles.ru/api/cdn
https://server2.filesdumpplace.org/api/poll
https://server2.filesdumpplace.org/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server2.filesdumpplace.org/api/restriction-us
https://server2.filesdumpplace.org/api/cdn
https://server14.filesdumpplace.org/api/poll
https://server7.filesdumpplace.org/api/poll
https://server14.filesdumpplace.org/api/signature/8e67f58837092385dcf01e8a2b4f5783
https://server14.filesdumpplace.org/api/restriction-us
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 178
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1013
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3000
comments 0

What is Glupteba malware?

Glupteba is a dropper — it is commonly used to install other malware samples on infected machines. Although it was initially thought that Glupteba was developed to be a part of a malicious campaign codenamed Operation Windigo, researchers now believe that it is independent malware.

Although Glupteba trojan classifies as a dropper it has some additional dangerous functions. For example, it has the ability to steal information from infected systems. In addition, it can download a component that is able to control routers and relay traffic.

Furthermore, it seems that this malware is under active development and creators employ dangerous and rarely used techniques to keep their creation active despite various malware removal programs. The reason is probably behind their presumable move to a pay-per-install distribution scheme which means that they must keep the malware relevant to profit from it.

General description of Glupteba dropper

Glupteba malware was first spotted in the wild in 2011 when it was distributed by TDL-4 bootkit among a series of other malware types. The virus went quite for a long time thanks to the malware removal tools until it surfaced again three years later. This time Glupteba was seen in Operation Windigo.

In addition, researchers discovered that command and control domains of Glupteba dropper were hosted on the same machines that powered parts of the Operation Windigo infrastructure. However, the exact connection between Glupteba and Windigo is unclear.

Until recently we didn’t hear much about Glupteba trojan anymore before it surfaced again carrying new, dangerous functionally.

Today, apart from the main dropper functionality Glupteba malware comes with two components: the browsers stealer component and the router exploiter.

The browser stealer comes in two versions that target Chrome, Opera, and the Yandex browser. The malware is capable of stealing cookies and browser history as well as private login credentials.

Then there is the router exploiter component. It exploits the CVE-2018-14847 vulnerability to take control of the routers. This allows attackers to turn compromised routers into SOCKS proxies, which redirect traffic from compromised machines. Thus, infected routers can become relay points for spam distribution and more.

For instance, there is a theory that some of the relayed traffic is part of an attack on Instagram, though it is impossible to tell for sure due to the HTTP encryption.

Malware analysis of Glupteba

The video generated by the ANY.RUN interactive malware hunting service shows the execution process of Glupteba. You can also analyze other malicious objects like Ave Maria and Smoke Loader.

process graph of the glupteba execution Figure 1: This graph generated by the ANY.RUN malware hunting service shows processes started by Glupteba Trojan

text report of the glupteba analysis Figure 2: A customizable text report created by ANY.RUN

Glupteba trojan execution process

After Glupteba makes its way into the system it's starts CMD.exe process to run CompMgmtLauncher.exe ("Computer Management Snapin Launcher"). The malware uses CompMgmtLauncher.exe to bypass UAC and run itself with administrative privileges. After that, it typically adds itself to autorun in the registry, renames an executable file and copies it to Windows subdirectories. Glupteba also checks the system for anti-malware solutions, adds firewall rules and defender exclusions. In addition to the above, this malware also adds itself to Schedule Tasks to persistence in the infected system. Throughout its lifecycle, Glupteba exchanges packets with the C2 server and has the ability to download other malware.

Glupteba C&C communication

Glupteba has a rather unique trick up its sleeve that involves no other than the Bitcoin blockchain. It can use transactions in the Bitcoin network to receive C&C domains. This function is triggered on schedule or by demand if there is a need.

It enables the attackers to pass new C&C domains to the malware, allowing it to restore operation by reconnecting to a new domain if something happens to the old one.

Glupteba malware distribution

It should be noted that Glupteba has a very wide distribution range. Since 2017 it has been spotted in 180 countries, though almost one-third of the attacks were concentrated in Ukraine, Russia, and Turkey.

In the past, the malware was distributed using the infrastructure provided by Windigo’s, however, currently, it is using its own botnet and employes CsdiMonetize adware. The latter downloads another dropper which, in turn, installs the trojan itself.

How to detect Glupteba using ANY.RUN?

Since Glupteba adds records into the registry, analysts can detect it by looking at registry keys. To do so, choose the process by clicking on it in the process tree of the task then click on the "More info" button. In "Advanced details of process" window switch to the "Registry changes" tab and take a closer look. If the analyzed sample writes a key with the name "UUID" into the key HKEY_CURRENT_USER\Software\Microsoft\TestApp, you are dealing with Glupteba and it's time to get the malware removal program ready.

how to detect glupteba Figure 3: Changes Glupteba made in the registry

Conclusion

Glupteba is proving to be a rather dangerous malware that researchers and cybersecurity specialists should not take lightly. Besides its ability to install other malware samples on infected machines, the malware is capable of stealing information from web browser applications. It can also download a component that reroutes traffic by taking control of web-routers.

We also know that this malware uses unique techniques when it comes to C&C communication. And if that was not enough, evidence suggests that it is in active development and attackers seem to be adding more potentially destructive features.

ANY.RUN has prepared a selection of advanced tools that allow to dissect and study a sample of Glupteba in an interactive sandbox environment which gives the researcher an ability to pause the simulation and make corrections at any time. Hopefully, by studying this threat along with many others we will be able to medicate the consensus of future malicious attacks.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More