MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 799cde477706f70c4f7ccdf560cdcafa60012683440eddecfe2bc2ef0c839e2b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Glupteba


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: 799cde477706f70c4f7ccdf560cdcafa60012683440eddecfe2bc2ef0c839e2b
SHA3-384 hash: e2b526365db0f33e6460e396ea496eff51e4c36a44a8aec6b84f49cb94c69a25d0bbd846fbdabb12d34bf802a6e82669
SHA1 hash: 979dd274cfa135729460903b450e4cb611565fb5
MD5 hash: 54fb21c36656bcb0776075fc18224be2
humanhash: winner-music-salami-seven
File name:54fb21c36656bcb0776075fc18224be2.exe
Download: download sample
Signature Glupteba
File size:427'368 bytes
First seen:2023-12-04 09:29:57 UTC
Last seen:2023-12-04 11:22:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:0PqdN4yJRKGs603WmORMhfJalGBayB5yWI3DhieQ5XxdXmHy3YiZpe18Lt:aqRJEEaWZaMIBaI5E1ieA/WHy3YmLt
Threatray 5 similar samples on MalwareBazaar
TLSH T1D094D0E4139D466AC7DE4978C0B5F21C213D81BB3282E762BBDC6CF9564BB81C943396
TrID 30.2% (.EXE) Win64 Executable (generic) (10523/12/4)
18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.9% (.EXE) Win32 Executable (generic) (4505/5/1)
5.9% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe Glupteba

Intelligence


File Origin
# of uploads :
2
# of downloads :
304
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Creating a file
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a process from a recently created file
Creating a window
Creating a file in the %temp% directory
Searching for synchronization primitives
Creating a file in the %AppData% subdirectories
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Running batch commands
Creating a service
Launching the process to interact with network services
Launching the default Windows debugger (dwwin.exe)
Blocking the User Account Control
Query of malicious DNS domain
Enabling autorun for a service
Launching a tool to kill processes
Adding exclusions to Windows Defender
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Petite Virus, Socks5Systemz, onl
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables UAC (registry)
Drops script or batch files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Generic Stealer
Yara detected onlyLogger
Yara detected Petite Virus
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1353039 Sample: W3YISK9B8K.exe Startdate: 04/12/2023 Architecture: WINDOWS Score: 100 163 Multi AV Scanner detection for domain / URL 2->163 165 Malicious sample detected (through community Yara rule) 2->165 167 Antivirus detection for URL or domain 2->167 169 16 other signatures 2->169 10 W3YISK9B8K.exe 2 4 2->10         started        13 svchost.exe 2->13         started        15 svchost.exe 1 2->15         started        17 5 other processes 2->17 process3 signatures4 177 Writes to foreign memory regions 10->177 179 Allocates memory in foreign processes 10->179 181 Adds extensions / path to Windows Defender exclusion list (Registry) 10->181 187 3 other signatures 10->187 19 AddInProcess32.exe 15 502 10->19         started        24 powershell.exe 23 10->24         started        26 CasPol.exe 10->26         started        183 Changes security center settings (notifications, updates, antivirus, firewall) 13->183 185 Query firmware table information (likely to detect VMs) 15->185 28 WerFault.exe 17->28         started        30 WerFault.exe 17->30         started        32 WerFault.exe 17->32         started        34 WerFault.exe 17->34         started        process5 dnsIp6 139 98.126.19.29 VPLSNETUS United States 19->139 141 91.92.241.91 THEZONEBG Bulgaria 19->141 143 14 other IPs or domains 19->143 109 C:\Users\...\xobjx5Hjot9F4a0kOxrQnxEe.exe, PE32 19->109 dropped 111 C:\Users\...\wu3I7rX4iOxYtk8biqmGlxiN.exe, PE32 19->111 dropped 113 C:\Users\...\wEZnxPERKZ5VaaHeGIMjohwl.exe, PE32 19->113 dropped 115 261 other files (196 malicious) 19->115 dropped 171 Drops script or batch files to the startup folder 19->171 173 Creates HTML files with .exe extension (expired dropper behavior) 19->173 175 Writes many files with high entropy 19->175 36 jnHGMM1S7gtAkvBeRXoFY9d0.exe 19->36         started        39 CGfAwyS57YgvDdOTgSHhq35I.exe 19->39         started        42 vMr0DQnWMvGmnWNMFhInsOJT.exe 19->42         started        46 5 other processes 19->46 44 conhost.exe 24->44         started        file7 signatures8 process9 dnsIp10 117 C:\Users\...\jnHGMM1S7gtAkvBeRXoFY9d0.tmp, PE32 36->117 dropped 48 jnHGMM1S7gtAkvBeRXoFY9d0.tmp 36->48         started        145 85.209.11.204 SYNGB Russian Federation 39->145 147 194.5.249.115 NXTHOST-64398NXTHOSTCOM-NXTSERVERSSRLRO Romania 39->147 149 2 other IPs or domains 39->149 119 C:\Users\user\AppData\...\3590428492.exe, PE32 39->119 dropped 121 C:\Users\user\AppData\...\BIFPuKaW1X[1].exe, PE32 39->121 dropped 123 C:\Users\user\AppData\...\BIFPuKaW1X[1].exe, PE32 39->123 dropped 52 cmd.exe 39->52         started        125 C:\Users\...\vMr0DQnWMvGmnWNMFhInsOJT.tmp, PE32 42->125 dropped 54 vMr0DQnWMvGmnWNMFhInsOJT.tmp 42->54         started        127 C:\Users\user\AppData\...\4325934148.exe, PE32 46->127 dropped 129 C:\Users\user\AppData\...\4272827180.exe, PE32 46->129 dropped 131 C:\Users\user\AppData\...\4373321721.exe, PE32 46->131 dropped 133 4 other files (none is malicious) 46->133 dropped 56 cmd.exe 46->56         started        58 cmd.exe 46->58         started        file11 process12 file13 93 C:\Program Files (x86)\...\qtwasapi.exe, PE32 48->93 dropped 95 C:\Program Files (x86)\...\is-KIMT2.tmp, PE32 48->95 dropped 97 C:\Program Files (x86)\...\is-J39BS.tmp, PE32 48->97 dropped 105 56 other files (none is malicious) 48->105 dropped 151 Uses schtasks.exe or at.exe to add and modify task schedules 48->151 60 net.exe 48->60         started        62 schtasks.exe 48->62         started        76 2 other processes 48->76 64 3590428492.exe 52->64         started        68 conhost.exe 52->68         started        99 C:\Program Files (x86)\...\is-TAA9B.tmp, PE32 54->99 dropped 101 C:\Program Files (x86)\...\is-PK4GL.tmp, PE32 54->101 dropped 103 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 54->103 dropped 107 54 other files (none is malicious) 54->107 dropped 70 4272827180.exe 56->70         started        79 2 other processes 56->79 72 4325934148.exe 58->72         started        74 conhost.exe 58->74         started        signatures14 process15 dnsIp16 81 conhost.exe 60->81         started        83 net1.exe 60->83         started        85 conhost.exe 62->85         started        137 144.76.82.108 HETZNER-ASDE Germany 64->137 153 Detected unpacking (changes PE section rights) 64->153 155 Detected unpacking (overwrites its own PE header) 64->155 157 Tries to steal Instant Messenger accounts or passwords 64->157 161 2 other signatures 64->161 87 WerFault.exe 64->87         started        89 WerFault.exe 64->89         started        159 Tries to harvest and steal browser information (history, passwords, etc) 70->159 91 WerFault.exe 72->91         started        135 C:\ProgramData\SmartDVDSvc\SmartDVDSvc.exe, PE32 76->135 dropped file17 signatures18 process19
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-12-03 22:23:56 UTC
AV detection:
14 of 23 (60.87%)
Threat level:
  5/5
Result
Malware family:
glupteba
Score:
  10/10
Tags:
family:glupteba discovery dropper evasion loader persistence spyware stealer trojan upx
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies system certificate store
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Modifies Windows Firewall
Glupteba
Glupteba payload
UAC bypass
Windows security bypass
Unpacked files
SH256 hash:
799cde477706f70c4f7ccdf560cdcafa60012683440eddecfe2bc2ef0c839e2b
MD5 hash:
54fb21c36656bcb0776075fc18224be2
SHA1 hash:
979dd274cfa135729460903b450e4cb611565fb5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Glupteba

Executable exe 799cde477706f70c4f7ccdf560cdcafa60012683440eddecfe2bc2ef0c839e2b

(this sample)

  
Delivery method
Distributed via web download

Comments