| File name: | 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader |
| Full analysis: | https://app.any.run/tasks/72af676d-7a03-4551-b9e0-0352784222c6 |
| Verdict: | Malicious activity |
| Threats: | Glupteba is a loader with information-stealing and traffic routing functionality. It is designed primarily to install other viruses on infected PCs but can do much more than that. In addition, it is being constantly updated, making this virus one to watch out for. |
| Analysis date: | April 25, 2025, 03:18:50 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections |
| MD5: | 2649779BBC9FE522BDCB478C3D10E869 |
| SHA1: | 63EC34CF748E18A68C3599F4B8903E0DDFF1A6E8 |
| SHA256: | 983AED9A3588545EF98AE76E4EFB75D5191C05CB7B46C1632C52141C454EE4FA |
| SSDEEP: | 196608:j2BaQK2Pp0xGNF2xoKHy+nN91UFIxw+iv:j2RKEp0xGH2CKBnN5fw |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2018:10:02 17:41:24+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 6360576 |
| InitializedDataSize: | 4900352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x5f8e0d |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.5.1 |
| ProductVersionNumber: | 1.1.0.1 |
| FileFlagsMask: | 0x006f |
| FileFlags: | Pre-release, Patched |
| FileOS: | Unknown (0x40304) |
| ObjectFileType: | Static library |
| FileSubtype: | 81 |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 456 | C:\WINDOWS\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\admin\AppData\Roaming\EpicNet Inc\CloudNet\cloudnet.exe" enable=yes" | C:\Windows\System32\cmd.exe | — | 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 960 | "C:\WINDOWS\system32\fodhelper.exe" | C:\Windows\System32\fodhelper.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Features On Demand Helper Exit code: 3221226540 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1812 | C:\WINDOWS\rss\csrss.exe /6-smoke-loader | C:\Windows\rss\csrss.exe | 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Modules
| |||||||||||||||
| 2096 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5512 -s 572 | C:\Windows\SysWOW64\WerFault.exe | — | csrss.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2148 | "C:\WINDOWS\rss\csrss.exe" | C:\Windows\rss\csrss.exe | fodhelper.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 3221225622 Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2284 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 8044 -s 744 | C:\Windows\SysWOW64\WerFault.exe | — | 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2392 | C:\WINDOWS\Sysnative\cmd.exe /C fodhelper | C:\Windows\System32\cmd.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3100 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6044 -s 628 | C:\Windows\SysWOW64\WerFault.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4896 | fodhelper | C:\Windows\System32\fodhelper.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Features On Demand Helper Exit code: 3221226540 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | Name |
Value: CoolSilence | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | Firewall |
Value: | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | Defender |
Value: | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | Servers |
Value: https://weekdanys.com | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | UUID |
Value: | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | Command |
Value: 0000000000000000 | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | FirstInstallDate |
Value: 25FF0A6800000000 | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | CloudnetFileURL |
Value: http://donaldcity.club/cl.exe | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | ServiceVersion |
Value: | |||
| (PID) Process: | (7452) 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\TestApp |
| Operation: | write | Name: | SC |
Value: 0000000000000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 8044 | 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | C:\Windows\rss\csrss.exe | executable | |
MD5:2649779BBC9FE522BDCB478C3D10E869 | SHA256:983AED9A3588545EF98AE76E4EFB75D5191C05CB7B46C1632C52141C454EE4FA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 52.11.240.239:443 | https://okonewacon.com/api/register | unknown | — | — | unknown |
— | — | POST | 200 | 3.229.117.57:443 | https://weekdanys.com/api/register | unknown | — | — | unknown |
— | — | POST | 200 | 3.229.117.57:443 | https://weekdanys.com/api/register | unknown | — | — | unknown |
— | — | POST | 200 | 52.11.240.239:443 | https://okonewacon.com/api/register | unknown | — | — | unknown |
— | — | POST | 200 | 52.11.240.239:443 | https://okonewacon.com/api/register | unknown | — | — | unknown |
— | — | POST | 200 | 3.229.117.57:443 | https://weekdanys.com/api/register | unknown | — | — | unknown |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 2.16.164.49:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
2104 | svchost.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
7452 | 2025-04-25_2649779bbc9fe522bdcb478c3d10e869_amadey_elex_mafia_smoke-loader.exe | 3.229.117.57:443 | weekdanys.com | AMAZON-AES | US | malicious |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1812 | csrss.exe | 3.229.117.57:443 | weekdanys.com | AMAZON-AES | US | malicious |
1812 | csrss.exe | 52.11.240.239:443 | okonewacon.com | AMAZON-02 | US | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
weekdanys.com |
| malicious |
okonewacon.com |
| unknown |
blackempirebuild.com |
| unknown |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Malware Command and Control Activity Detected | ET MALWARE Glupteba CnC Observed in DNS Query |
— | — | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
— | — | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
— | — | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
— | — | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
— | — | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
— | — | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
— | — | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
— | — | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
1812 | csrss.exe | Malware Command and Control Activity Detected | ET MALWARE Observed Glupteba CnC Domain (okonewacon .com in TLS SNI) |