MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5de000c94215943f6ddbb15376ca07f67f9965ab58cbd3335279ae66baf56bb6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Glupteba


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: 5de000c94215943f6ddbb15376ca07f67f9965ab58cbd3335279ae66baf56bb6
SHA3-384 hash: 0e0b83fc404a4c049dab8478c6022f32316f9fe906b66d86dd52ad8dfe8cdf8dcb2d35d28ba35fb587e536b575d21845
SHA1 hash: 95775af4c46091ea5873f2293d04e2669cbfdc98
MD5 hash: b8de7c98fe348d04ca8609d7376c7955
humanhash: mexico-bluebird-hawaii-kilo
File name:file
Download: download sample
Signature Glupteba
File size:4'246'016 bytes
First seen:2024-03-19 23:34:13 UTC
Last seen:2024-03-20 10:15:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fe51a7746c23b2c743a8567317181013 (1 x Glupteba)
ssdeep 49152:VlyzgGORs6XChYeMOMs8EOruQnWCmxynuU1gFeGokmNyDJqJWv:V+NBYnnm4nubSVW
Threatray 64 similar samples on MalwareBazaar
TLSH T107169D02F7E405E4E467C634C93A9732D7B2BC9A5731D28B0914F35A1E73AE18F6B621
TrID 72.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
13.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.EXE) OS/2 Executable (generic) (2029/13)
2.5% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter Bitsight
Tags:exe Glupteba


Avatar
Bitsight
url: http://89.251.22.76/files/installSetup2.exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
365
Origin country :
US US
Vendor Threat Intelligence
Malware family:
glupteba
ID:
1
File name:
5de000c94215943f6ddbb15376ca07f67f9965ab58cbd3335279ae66baf56bb6.exe
Verdict:
Malicious activity
Analysis date:
2024-03-19 23:36:34 UTC
Tags:
loader stealer stealc trojan glupteba

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Connecting to a non-recommended domain
Sending an HTTP GET request
Sending an HTTP GET request to an infection source
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Creating a window
Moving a recently created file
Searching for synchronization primitives
Creating a service
Creating a file in the %AppData% subdirectories
Launching the default Windows debugger (dwwin.exe)
Running batch commands
Connection attempt to an infection source
Enabling autorun for a service
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug fingerprint hacktool
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, Mars Stealer, Stealc, Vidar
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Contain functionality to detect virtual machines
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops script or batch files to the startup folder
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected Mars stealer
Yara detected Stealc
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1412058 Sample: file.exe Startdate: 20/03/2024 Architecture: WINDOWS Score: 100 146 Found malware configuration 2->146 148 Malicious sample detected (through community Yara rule) 2->148 150 Antivirus detection for dropped file 2->150 152 15 other signatures 2->152 10 file.exe 2->10         started        13 rundll32.exe 2->13         started        process3 signatures4 182 Writes to foreign memory regions 10->182 184 Allocates memory in foreign processes 10->184 186 Sample uses process hollowing technique 10->186 188 Injects a PE file into a foreign processes 10->188 15 jsc.exe 15 531 10->15         started        process5 dnsIp6 134 91.92.250.47 THEZONEBG Bulgaria 15->134 136 107.167.110.211 OPERASOFTWAREUS United States 15->136 138 14 other IPs or domains 15->138 64 C:\Users\...\yrrvUv64lEUjT5TI0eE0tPFI.exe, PE32 15->64 dropped 66 C:\Users\...\xQN7r6a7lxXRDW7XXNH3Iv23.exe, PE32 15->66 dropped 68 C:\Users\...\xEwbYm1KSylNX6mKGSc2N4Tp.exe, PE32 15->68 dropped 70 285 other malicious files 15->70 dropped 140 Drops script or batch files to the startup folder 15->140 142 Creates HTML files with .exe extension (expired dropper behavior) 15->142 144 Writes many files with high entropy 15->144 20 edwDl9GjB800O2N713LM9d5C.exe 15->20         started        25 KXJAZLmeRzth5qOi3XHIxayg.exe 1 3 15->25         started        27 DxPLsOuXuqfcYV2Y3HwTKHqz.exe 15->27         started        29 17 other processes 15->29 file7 signatures8 process9 dnsIp10 116 107.167.110.217 OPERASOFTWAREUS United States 20->116 118 107.167.125.189 OPERASOFTWAREUS United States 20->118 126 6 other IPs or domains 20->126 76 Opera_installer_2403192335552217232.dll, PE32 20->76 dropped 90 8 other malicious files 20->90 dropped 170 Writes many files with high entropy 20->170 31 edwDl9GjB800O2N713LM9d5C.exe 20->31         started        48 2 other processes 20->48 120 185.172.128.126 NADYMSS-ASRU Russian Federation 25->120 122 185.172.128.187 NADYMSS-ASRU Russian Federation 25->122 124 185.172.128.90 NADYMSS-ASRU Russian Federation 25->124 78 C:\Users\user\AppData\Local\Temp\u190.1.exe, PE32 25->78 dropped 80 C:\Users\user\AppData\Local\Temp\u190.0.exe, PE32 25->80 dropped 172 Detected unpacking (changes PE section rights) 25->172 174 Detected unpacking (overwrites its own PE header) 25->174 34 u190.0.exe 25->34         started        38 u190.1.exe 25->38         started        82 C:\Users\...\DxPLsOuXuqfcYV2Y3HwTKHqz.tmp, PE32 27->82 dropped 40 DxPLsOuXuqfcYV2Y3HwTKHqz.tmp 27->40         started        84 C:\Users\user\AppData\Local\Temp\u6io.1.exe, PE32 29->84 dropped 86 C:\Users\user\AppData\Local\Temp\u6io.0.exe, PE32 29->86 dropped 88 C:\Users\user\AppData\Local\Temp\u61g.1.exe, PE32 29->88 dropped 92 10 other malicious files 29->92 dropped 176 Found Tor onion address 29->176 178 Contain functionality to detect virtual machines 29->178 180 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 29->180 42 5UEK5D3CUOL3cjuLNuKF54DU.tmp 29->42         started        44 syncUpd.exe 29->44         started        46 u61g.0.exe 29->46         started        50 3 other processes 29->50 file11 signatures12 process13 dnsIp14 100 15 other malicious files 31->100 dropped 52 edwDl9GjB800O2N713LM9d5C.exe 31->52         started        112 185.172.128.145 NADYMSS-ASRU Russian Federation 34->112 114 185.172.128.65 NADYMSS-ASRU Russian Federation 34->114 102 14 other files (10 malicious) 34->102 dropped 154 Detected unpacking (changes PE section rights) 34->154 156 Detected unpacking (overwrites its own PE header) 34->156 158 Tries to steal Mail credentials (via file / registry access) 34->158 168 4 other signatures 34->168 160 Checks if the current machine is a virtual machine (disk enumeration) 38->160 94 C:\Users\user\AppData\...\vrcpcpruler.exe, PE32 40->94 dropped 96 C:\Users\user\AppData\...\unins000.exe (copy), PE32 40->96 dropped 98 C:\Users\user\...\libwinpthread-1.dll (copy), PE32 40->98 dropped 104 15 other files (14 malicious) 40->104 dropped 55 vrcpcpruler.exe 40->55         started        57 vrcpcpruler.exe 40->57         started        106 11 other files (10 malicious) 42->106 dropped 162 Found evasive API chain (may stop execution after checking locale) 44->162 164 Searches for specific processes (likely to inject) 44->164 108 2 other malicious files 48->108 dropped 110 2 other malicious files 50->110 dropped 166 Multi AV Scanner detection for dropped file 50->166 60 cmd.exe 50->60         started        file15 signatures16 process17 dnsIp18 72 Opera_installer_2403192336052007984.dll, PE32 52->72 dropped 74 C:\...\PrintWorkflow 1.34.199.67.exe, PE32 55->74 dropped 128 91.211.247.248 VPSNET-ASLT Lithuania 57->128 130 195.16.74.230 GTT-BACKBONEGTTDE Russian Federation 57->130 132 88.80.148.19 BELCLOUDBG Bulgaria 57->132 62 conhost.exe 60->62         started        file19 process20
Threat name:
Win64.Trojan.Operaloader
Status:
Malicious
First seen:
2024-03-19 23:35:07 UTC
File Type:
PE+ (Exe)
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:socks5systemz family:stealc family:zgrat botnet discovery dropper evasion loader persistence rat spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Modifies data under HKEY_USERS
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
NSIS installer
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
UPX packed file
Unexpected DNS network traffic destination
Windows security modification
Downloads MZ/PE file
Modifies Windows Firewall
Detect ZGRat V1
Glupteba
Glupteba payload
Socks5Systemz
Stealc
Windows security bypass
ZGRat
Malware Config
C2 Extraction:
http://185.172.128.145
http://bgjgwxb.com/search/?q=67e28dd83955a42b4006aa1b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ee8889b5e4fa9281ae978f671ea771795af8e05c644db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a6786f610c3e89d
http://bgjgwxb.com/search/?q=67e28dd83955a42b4006aa1b7c27d78406abdd88be4b12eab517aa5c96bd86ef91804f815a8bbc896c58e713bc90c91b36b5281fc235a925ed3e55d6bd974a95129070b617e96cc92be20ea778c255bbe258b90d3b4eed3233d1626a8ff810c0e79c9b38ca67
Unpacked files
SH256 hash:
5de000c94215943f6ddbb15376ca07f67f9965ab58cbd3335279ae66baf56bb6
MD5 hash:
b8de7c98fe348d04ca8609d7376c7955
SHA1 hash:
95775af4c46091ea5873f2293d04e2669cbfdc98
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:NET
Author:malware-lu
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Glupteba

Executable exe 5de000c94215943f6ddbb15376ca07f67f9965ab58cbd3335279ae66baf56bb6

(this sample)

  
Dropped by
Privateloader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::RevertToSelf
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::ImpersonateLoggedOnUser
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenThreadToken
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::VirtualAllocExNuma
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::GetSystemDirectoryW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptDecrypt
bcrypt.dll::BCryptDestroyKey
bcrypt.dll::BCryptEncrypt
bcrypt.dll::BCryptGenRandom
bcrypt.dll::BCryptImportKey
bcrypt.dll::BCryptOpenAlgorithmProvider
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW

Comments