Glupteba Trojan

Glupteba is a combined information stealing and downloader trojan associated with the Operation Windigo advanced persistent threat.

Early Glupteba campaigns used compromised Linux-based web servers to distribute the malware, however, later campaigns shifted to an unidentified adware-as-a-service platform for delivery. The most recent campaigns have now begun using an unnamed preliminary dropper delivered via malvertising to install Glupteba.

Trend Micro has identified a new strain that contains a browser stealer for sensitive data and a routine exploiter for MikroTik routers via the CVE-2018-14847 vulnerability.

Once delivered, Glupteba will connect to a command and control server (see below) before attempting to extract account data, browser profiles and passwords using an additional key logging module. It will then enumerate the local network to discover any Internet-of-Things devices, installing a SOCKS proxy on any it finds. Glupteba is also able to install other payloads including cryptocurrency miners and ransomware tools.

Indicators of Compromise

IP Addresses

  • 5[.]9[.]157[.]50

URLs

  • bigtext[.]club
  • blackempirebuild[.]com
  • clubhouse[.]site
  • keepmusic[.]xyz
  • lienews[.]world
  • nxtfdata[.]xyz
  • okonewacon[.]com
  • phonemus[.]net
  • playfire[.]online
  • takebad1[.]com
  • venoxcontrol[.]com

Jason Davies

UK based technology professional, with an interest in computer security and telecoms.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: