Threat Database Trojans Trojan.Glupteba

Trojan.Glupteba

Threat Scorecard

Ranking: 12,155
Threat Level: 80 % (High)
Infected Computers: 14,038
First Seen: March 5, 2014
Last Seen: August 29, 2023
OS(es) Affected: Windows

The Glupteba Trojan is a threat that has been known to malware researchers for a while. In previous campaigns, it appeared that the main purpose of the Glupteba Trojan is to infect as many devices it can and use them to build a botnet. Usually, botnets are used for crypto mining operations, DDoS (Distributed-Denial-of-Service) attacks, and to be rented out as a service to other shady actors online. However, the Glupteba Trojan has recently made a comeback, and its activity appears to be spiking. The Glupteba malware has returned in the shape of a Trojan dropper, which can not only serve as a gateway for more threats to be planted on the host but also can allow its operators to get almost complete control over the infected machine.


This Week In Malware Ep 13: Glupteba Cryptojacking Malware Becomes Unstoppable

Propagation Method

The latest Glupteba variant is propagated via a malvertising campaign that is likely to reach users in multiple parts of the world. Furthermore, the Glupteba Trojan's payload packs a heavily obfuscated dropper that is meant to deliver additional malware - an information collector, and a weaponized exploit that targets a vulnerability in MikroTik routers.

Dropper Module

The Glupteba Trojan has a dropper module, which is used to deliver the MikroTik router exploit, as well as the info stealer. The Glupteba Trojan dropper module is written in Google's Go programming language and has the ability to detect whether it is being run in a sandbox environment or a regular system. Its code is heavily obfuscated to make it nearly impossible for anti-malware tools to detect its activity. The Glupteba dropper module also makes sure to tamper with the Windows Firewall and the Windows Defender and thus manages to bypass their security measures.

Backdoor Module

The Glupteba Trojan's backdoor module packs a wide variety of capabilities. This backdoor module can:

  • Execute a Monero cryptocurrency miner module.
  • Download files.
  • Execute files.
  • Collect files.
  • Modify the Registry.
  • Update its server.
  • List processes.

Infostealer Module

The info stealer module of the Glupteba Dropper can collect saved login credentials from Web browsers like Google Chrome, Yandex Web and Opera. Furthermore, this module can also siphon other sensitive data to the C&C (Command & Control) servers of the attackers such as user profiles, cookies and browsing history.

It is fundamental to download and install a legitimate anti-virus software suite to keep your system safe from nasty threats like the Glupteba malware.

SpyHunter Detects & Remove Trojan.Glupteba

File System Details

Trojan.Glupteba may create the following file(s):
# File Name MD5 Detections
1. gupdate.exe 968418dd7dfbcb3e81df410eaa764250 301
2. gupdate.exe da6cb55cec0c8b4eb9af11592d623331 191
3. gupdate.exe e3ae6a9a5396fc4ae776555315488fa6 184
4. gupdate.exe 7a050b9f6e6ef8d30cb402d6cc5272af 150
5. gupdate.exe ac9aa0fd18079eceab0a7184db363930 130
6. gupdate.exe d7eb3d895dcb321d48340c5e9c46334a 123
7. produpd.exe 7d703a41c2e2f7f61f3c0322160a811b 101
8. gupdate.exe ef76863f8579cb0a1acae0c4db77412b 97
9. gupdate.exe 5a2fe0cc2700033c70cd536d065f9191 97
10. monhost.exe 7f189af6207783b8217f24f77d322421 89
11. daemonupd.exe ec58d901b742c3dd6814af8a7651f175 78
12. gupdate.exe 9e7ac2841bb5f04da16b4af8dbdcdabf 75
13. gupdate.exe 9b3d13af2e1da6541ef94dc9667e40f3 73
14. gupdate.exe badc0bbb417726f78cb529719d4ef520 71
15. monhost.exe 34e8a05a5e5f2006ee8b143528cd1634 60
16. produpd.exe 03ddbb4b260f4a2da1fa96fe918281d8 46
17. produpd.exe 9fd43a49ced631b92cea22a54b58a60d 46
18. gupdate.exe 7211e078b09a505d667072be52394f80 42
19. monhost.exe 59d1969f55d9de345da8f2ea44376f1f 42
20. produpd.exe 875df1249b09c2dc997706dbfab2f61e 24
21. SGRP.exe be0b2ec3e79cc48040794712e3107b13 23
22. monhost.exe 8643a061cef199119a4612384b03987c 20
23. produpd.exe 298ec53d7b8016223e63fce73afe1d48 19
24. ProductUpdater.exe 64fec85722a86744dbbc50e337d633a1 16
25. ProductUpdater.exe b0d63cecb620da431d521ac00f82b548 12
26. gupdate.exe be98fa9ebd86245039aa42ccb589db5e 6
More files

Registry Details

Trojan.Glupteba may create the following registry entry or registry entries:
Regexp file mask
%APPDATA%\VDI\Shared\Product Updater\monhost.exe
%APPDATA%\VDI\Shared\Product Updater\produpd.exe
%LOCALAPPDATA%\NVIDIA Corporation\Updates\NvdUpd.exe
%PROGRAMFILES%\Microsoft\installer\SGRP.exe
%PROGRAMFILES%\xtex\gupdate\gupdate.exe
%PROGRAMFILES(x86)%\Company\gupdate\gupdate.exe
Software\VDI\Shared\Product Updater

Trending

Most Viewed

Loading...