MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d5704231952d0924f21dfd32c9459ecd2ebe553c71cc6e39415eb23c5c6ff9e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Glupteba


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: 3d5704231952d0924f21dfd32c9459ecd2ebe553c71cc6e39415eb23c5c6ff9e
SHA3-384 hash: e08046ef5c18289e95ce759b65fb72d7493c022836150d8a9f92a5a62c678df4644254fe04d2c023702a84ebeb1063fe
SHA1 hash: ec72d0e2d9fa182f0712360a5134018b6a9515dc
MD5 hash: 71273fd0b95c471aa262d35ff8b42143
humanhash: fillet-kansas-kilo-comet
File name:71273fd0b95c471aa262d35ff8b42143.exe
Download: download sample
Signature Glupteba
File size:2'464'992 bytes
First seen:2024-03-10 13:33:29 UTC
Last seen:2024-03-10 15:22:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 11023cc1693a4d95675efe5a86e50f50 (1 x Socks5Systemz, 1 x Glupteba)
ssdeep 49152:b6Zqqfqaao8Kf1cVgfwN7NwpPFSUztBp2/uswlxX5xBbzKi:b6j2Wy/uswlxJzh
TLSH T1B0B59E08F3A816D4E6EBCA34CA868B32FBF1B406073155CB095AD2571E73AA75F6F510
TrID 72.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
13.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.EXE) OS/2 Executable (generic) (2029/13)
2.5% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:exe Glupteba signed

Code Signing Certificate

Organisation:Microsoft Code Signing PCA 2011
Issuer:Microsoft Code Signing PCA 2011
Algorithm:sha256WithRSAEncryption
Valid from:2024-03-09T10:25:52Z
Valid to:2025-03-09T10:25:52Z
Serial number: 221181a97e0590fa11b88d8770ba4c7e
Thumbprint Algorithm:SHA256
Thumbprint: 1811b3b5a8f60e4d2a0db96258934879d7f40253decee503d4b81ea8849013fa
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
541
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
4363463463464363463463463.exe
Verdict:
Malicious activity
Analysis date:
2024-03-10 14:37:46 UTC
Tags:
opendir loader hausbomber risepro stealer evasion stealc laplasclipper gcleaner trojan gh0stcringe gh0st remote rat redline phorpiex lumma socks5systemz proxy banload payload lokibot asyncrat nitol shellcode xworm kelihos ramnit hijackloader quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug fingerprint hacktool lolbin overlay packed redcap shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, Mars Stealer, Stealc, Vidar
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops script or batch files to the startup folder
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the hosts file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Drops script at startup location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
UAC bypass detected (Fodhelper)
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected Mars stealer
Yara detected Stealc
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1406136 Sample: uKbXAans9z.exe Startdate: 10/03/2024 Architecture: WINDOWS Score: 100 156 Found malware configuration 2->156 158 Malicious sample detected (through community Yara rule) 2->158 160 Multi AV Scanner detection for submitted file 2->160 162 12 other signatures 2->162 10 uKbXAans9z.exe 2->10         started        13 cmd.exe 2->13         started        15 svchost.exe 8 2->15         started        17 svchost.exe 2->17         started        process3 dnsIp4 170 Writes to foreign memory regions 10->170 172 Allocates memory in foreign processes 10->172 174 Sample uses process hollowing technique 10->174 176 Injects a PE file into a foreign processes 10->176 20 jsc.exe 15 312 10->20         started        25 WerFault.exe 19 16 10->25         started        27 jsc.exe 10->27         started        29 MrE0Ln5ERpIlWqSb6issvHSX.exe 13->29         started        31 conhost.exe 13->31         started        33 WerFault.exe 2 15->33         started        124 20.190.190.196 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 17->124 126 23.204.146.169 AKAMAI-ASN1EU United States 17->126 signatures5 process6 dnsIp7 138 107.167.110.211 OPERASOFTWAREUS United States 20->138 140 185.172.128.109 NADYMSS-ASRU Russian Federation 20->140 144 16 other IPs or domains 20->144 96 C:\Users\...\xdvdy4trcLEQgThX8ddAytWp.exe, PE32 20->96 dropped 98 C:\Users\...\wyj2rOFE7BVpgb08tcb8R7Tc.exe, PE32 20->98 dropped 100 C:\Users\...\vR65tpInggLaqkyzbxx6tPzP.exe, PE32+ 20->100 dropped 102 250 other malicious files 20->102 dropped 164 Drops script or batch files to the startup folder 20->164 166 Creates HTML files with .exe extension (expired dropper behavior) 20->166 35 YPA5HsGS8dQDxgBDVqnF6hAr.exe 20->35         started        39 p2267jLBaT2Vr7vIFrKuaQ9Q.exe 20->39         started        41 gu1LGiwJo6zKOUGGRxzAfVwH.exe 20->41         started        43 16 other processes 20->43 142 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 25->142 168 UAC bypass detected (Fodhelper) 29->168 file8 signatures9 process10 dnsIp11 128 185.172.128.187 NADYMSS-ASRU Russian Federation 35->128 130 185.172.128.90 NADYMSS-ASRU Russian Federation 35->130 78 C:\Users\user\AppData\Local\...\syncUpd.exe, PE32 35->78 dropped 80 C:\Users\user\AppData\Local\...\INetC.dll, PE32 35->80 dropped 82 C:\Users\user\AppData\...\BroomSetup.exe, PE32 35->82 dropped 46 syncUpd.exe 35->46         started        51 BroomSetup.exe 35->51         started        132 107.167.110.217 OPERASOFTWAREUS United States 39->132 134 107.167.125.189 OPERASOFTWAREUS United States 39->134 136 6 other IPs or domains 39->136 90 7 other malicious files 39->90 dropped 53 p2267jLBaT2Vr7vIFrKuaQ9Q.exe 39->53         started        55 p2267jLBaT2Vr7vIFrKuaQ9Q.exe 39->55         started        57 p2267jLBaT2Vr7vIFrKuaQ9Q.exe 39->57         started        84 Opera_installer_2403101354307237360.dll, PE32 41->84 dropped 92 3 other malicious files 41->92 dropped 59 gu1LGiwJo6zKOUGGRxzAfVwH.exe 41->59         started        61 gu1LGiwJo6zKOUGGRxzAfVwH.exe 41->61         started        86 Opera_installer_2403101354483585324.dll, PE32 43->86 dropped 88 Opera_installer_2403101354454787216.dll, PE32 43->88 dropped 94 7 other malicious files 43->94 dropped 178 Detected unpacking (changes PE section rights) 43->178 180 Detected unpacking (overwrites its own PE header) 43->180 182 Found Tor onion address 43->182 184 3 other signatures 43->184 63 IKtVJ8pjNXKERimkdPDshmGp.exe 43->63         started        65 powershell.exe 43->65         started        file12 signatures13 process14 dnsIp15 146 185.172.128.145 NADYMSS-ASRU Russian Federation 46->146 106 C:\Users\user\AppData\...\softokn3[1].dll, PE32 46->106 dropped 108 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 46->108 dropped 122 10 other files (6 malicious) 46->122 dropped 148 Detected unpacking (changes PE section rights) 46->148 150 Detected unpacking (overwrites its own PE header) 46->150 152 Found many strings related to Crypto-Wallets (likely being stolen) 46->152 154 5 other signatures 46->154 67 cmd.exe 51->67         started        110 Opera_installer_2403101354397957888.dll, PE32 53->110 dropped 69 p2267jLBaT2Vr7vIFrKuaQ9Q.exe 53->69         started        112 Opera_installer_2403101354313197352.dll, PE32 55->112 dropped 114 Opera_installer_2403101354329807460.dll, PE32 57->114 dropped 116 Opera_installer_2403101354324157392.dll, PE32 59->116 dropped 118 Opera_installer_2403101354350387640.dll, PE32 61->118 dropped 120 Opera_installer_2403101354583544436.dll, PE32 63->120 dropped 72 conhost.exe 65->72         started        file16 signatures17 process18 file19 74 conhost.exe 67->74         started        76 chcp.com 67->76         started        104 Opera_installer_2403101354419568008.dll, PE32 69->104 dropped process20
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-03-09 14:24:48 UTC
File Type:
PE+ (Exe)
AV detection:
9 of 37 (24.32%)
Threat level:
  2/5
Result
Malware family:
glupteba
Score:
  10/10
Tags:
family:glupteba discovery dropper evasion loader persistence spyware stealer upx
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
UPX packed file
Creates new service(s)
Downloads MZ/PE file
Modifies Windows Firewall
Stops running service(s)
Glupteba
Glupteba payload
Unpacked files
SH256 hash:
3d5704231952d0924f21dfd32c9459ecd2ebe553c71cc6e39415eb23c5c6ff9e
MD5 hash:
71273fd0b95c471aa262d35ff8b42143
SHA1 hash:
ec72d0e2d9fa182f0712360a5134018b6a9515dc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Glupteba

Executable exe 3d5704231952d0924f21dfd32c9459ecd2ebe553c71cc6e39415eb23c5c6ff9e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::RevertToSelf
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::ImpersonateLoggedOnUser
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenThreadToken
KERNEL32.dll::VirtualAllocExNuma
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::DeleteVolumeMountPointW
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetSystemInfo
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::GetSystemDirectoryW
KERNEL32.dll::RemoveDirectoryW
KERNEL32.dll::GetTempFileNameW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptDecrypt
bcrypt.dll::BCryptDestroyKey
bcrypt.dll::BCryptEncrypt
bcrypt.dll::BCryptGenRandom
bcrypt.dll::BCryptImportKey
bcrypt.dll::BCryptOpenAlgorithmProvider
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW

Comments