MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b0148744435d6298d2b73fe69019433ca6393e164af4e50709b7dda4b648891. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Glupteba


Vendor detections: 17


Intelligence 17 IOCs YARA 51 File information Comments

SHA256 hash: 8b0148744435d6298d2b73fe69019433ca6393e164af4e50709b7dda4b648891
SHA3-384 hash: ab9d8dc2b93e0e03bb6ea67a938c59af0d88610562a4ca0c9ce230604a1e4809659ab4d729e0ca378ec833b8ad845e78
SHA1 hash: 68e53829368abd4f1d23cb531131223881df97f7
MD5 hash: 8c819f7e632740c87d694356afc931ed
humanhash: east-two-autumn-lion
File name:231210-08-Glupteba-68a8fe.exe
Download: download sample
Signature Glupteba
File size:9'362'944 bytes
First seen:2024-07-24 12:11:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9cbefe68f395e67356e2a5d8d1b285c0 (58 x LummaStealer, 49 x AuroraStealer, 35 x Vidar)
ssdeep 98304:gHxMZDJ1TRpxYVX9u2iazANfLhZytTD5iqa:GxEvYjHzANDhwN
Threatray 637 similar samples on MalwareBazaar
TLSH T171966B91FA9B00F5EA13543084A7623F9331BD064B25CFCBD6506F2AED73AD20E36659
TrID 29.1% (.EXE) Win64 Executable (generic) (10523/12/4)
27.7% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
13.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.4% (.EXE) Win32 Executable (generic) (4504/4/1)
5.6% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter Anonymous
Tags:exe Glupteba


Avatar
Anonymous
this malware sample is very nasty!

Intelligence


File Origin
# of uploads :
1
# of downloads :
320
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
Execution Generic Network Stealth
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for synchronization primitives
Changing an executable file
Creating a window
Sending an HTTP GET request to an infection source
Using the Windows Management Instrumentation requests
Launching a process
Creating a process with a hidden window
Modifying an executable file
Launching a service
Restart of the analyzed sample
Creating a file in the Windows subdirectories
Adding an access-denied ACE
Running batch commands
Launching the process to change the firewall settings
Query of malicious DNS domain
Connection attempt to an infection source
Infecting executable files
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm anti-vm evasive expand fingerprint go golang hacktool lolbin packed shell32 stealer update
Result
Verdict:
MALICIOUS
Result
Threat name:
Bdaejec, Glupteba
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found Tor onion address
Infects executable files (exe, dll, sys, html)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Yara detected Bdaejec
Yara detected Glupteba
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480030 Sample: 231210-08-Glupteba-68a8fe.exe Startdate: 24/07/2024 Architecture: WINDOWS Score: 100 50 ddos.dnsnb8.net 2->50 52 Antivirus detection for URL or domain 2->52 54 Antivirus detection for dropped file 2->54 56 Antivirus / Scanner detection for submitted sample 2->56 58 11 other signatures 2->58 9 231210-08-Glupteba-68a8fe.exe 13 1 2->9         started        signatures3 process4 file5 38 C:\Users\user\AppData\Local\Temp\pCrEUV.exe, PE32 9->38 dropped 70 Found Tor onion address 9->70 13 231210-08-Glupteba-68a8fe.exe 1 9->13         started        17 pCrEUV.exe 14 9->17         started        20 powershell.exe 24 9->20         started        signatures6 process7 dnsIp8 40 C:\Windows\Temp\pCrEUV.exe, PE32 13->40 dropped 72 Found Tor onion address 13->72 22 pCrEUV.exe 11 13->22         started        26 powershell.exe 13->26         started        48 ddos.dnsnb8.net 44.221.84.105, 49710, 49712, 799 AMAZON-AESUS United States 17->48 42 C:\Program Files\7-Zip\Uninstall.exe, PE32 17->42 dropped 44 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 17->44 dropped 46 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 17->46 dropped 74 Antivirus detection for dropped file 17->74 76 Multi AV Scanner detection for dropped file 17->76 78 Detected unpacking (changes PE section rights) 17->78 82 2 other signatures 17->82 28 WerFault.exe 22 16 17->28         started        80 Loading BitLocker PowerShell Module 20->80 30 conhost.exe 20->30         started        file9 signatures10 process11 file12 34 C:\Program Files (x86)\...\wabmig.exe, PE32 22->34 dropped 36 C:\Program Files (x86)\Windows Mail\wab.exe, PE32 22->36 dropped 60 Antivirus detection for dropped file 22->60 62 Multi AV Scanner detection for dropped file 22->62 64 Detected unpacking (changes PE section rights) 22->64 68 2 other signatures 22->68 66 Loading BitLocker PowerShell Module 26->66 32 conhost.exe 26->32         started        signatures13 process14
Threat name:
Win32.Virus.Wapomi
Status:
Malicious
First seen:
2024-07-24 12:12:12 UTC
File Type:
PE (Exe)
Extracted files:
22
AV detection:
37 of 38 (97.37%)
Threat level:
  5/5
Result
Malware family:
glupteba
Score:
  10/10
Tags:
family:glupteba aspackv2 discovery dropper evasion execution loader persistence privilege_escalation rootkit trojan
Behaviour
Modifies data under HKEY_USERS
Modifies system certificate store
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
Program crash
System Location Discovery: System Language Discovery
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Checks installed software on the system
Manipulates WinMon driver.
Manipulates WinMonFS driver.
ASPack v2.12-2.42
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Windows security modification
Drops file in Drivers directory
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Modifies boot configuration data using bcdedit
Glupteba
Glupteba payload
Windows security bypass
Unpacked files
SH256 hash:
778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
MD5 hash:
09031a062610d77d685c9934318b4170
SHA1 hash:
880f744184e7774f3d14c1bb857e21cc7fe89a6d
SH256 hash:
414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0
MD5 hash:
d98e78fd57db58a11f880b45bb659767
SHA1 hash:
ab70c0d3bd9103c07632eeecee9f51d198ed0e76
Detections:
MAL_ME_RawDisk_Agent_Jan20_2
Parent samples :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 hash:
caa8e02d91cf6ded2cd6a9d0b218f536bdb99dbe2d19727df1ef899b619f5c01
MD5 hash:
ded1bb3a4536a459954fe78b7ef24994
SHA1 hash:
287e32ac702b9a66d73d959f76fefdfd1296aa2b
SH256 hash:
5dfd6eb519b114f61731b959b989797b1f2e9ae95ee4c1a7a69370b3842d8c24
MD5 hash:
b18f9e70d07bec7e3efac6de192db871
SHA1 hash:
6af1f424c9379f939a037d5a8d71d5f3e2faafd5
SH256 hash:
8b0148744435d6298d2b73fe69019433ca6393e164af4e50709b7dda4b648891
MD5 hash:
8c819f7e632740c87d694356afc931ed
SHA1 hash:
68e53829368abd4f1d23cb531131223881df97f7
Detections:
Glupteba
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:crime_ZZ_botnet_aicm
Author:imp0rtp3
Description:DDoS Golang Botnet sample for linux called 'aicm'
Reference:https://twitter.com/IntezerLabs/status/1401869234511175683
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:Glupteba
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_DisableWinDefender
Author:ditekSHen
Description:Detects executables containing artifacts associated with disabling Widnows Defender
Rule name:INDICATOR_SUSPICIOUS_EXE_DiscordURL
Author:ditekSHen
Description:Detects executables Discord URL observed in first stage droppers
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA
Author:ditekSHen
Description:Detects executables referencing many varying, potentially fake Windows User-Agents
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:SUSP_Websites
Author:SECUINFRA Falcon Team
Description:Detects the reference of suspicious sites that might be used to download further malware
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UroburosVirtualBoxDriver
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Exploit_Generic_e95cc41c
Author:Elastic Security
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Glupteba

Executable exe 8b0148744435d6298d2b73fe69019433ca6393e164af4e50709b7dda4b648891

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryW
kernel32.dll::GetSystemInfo
WIN_BASE_EXEC_APICan Execute other programskernel32.dll::WriteConsoleW
kernel32.dll::SetConsoleCtrlHandler
kernel32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileA
kernel32.dll::GetSystemDirectoryA

Comments