Right here’s a SophosLabs technical paper that ought to tick all of your jargon containers!
Our specialists have deconstructed a pressure of malware known as Glupteba that makes use of nearly each cybercrime trick you’ve heard of, and possibly a number of extra apart from.
Like plenty of malware today. Glupteba is what’s recognized a zombie or bot (brief for software program robotic) that may be managed from afar by the crooks who wrote it.
But it surely’s greater than only a distant management software for criminals, as a result of Glupteba additionally features a vary of parts that permit it function all the following:
- A rootkit. Glupteba consists of quite a lot of Home windows kernel drivers that may conceal the existence of particular information and processes. Kernel rootkits are uncommon today as a result of they’re complicated to put in writing and infrequently draw pointless consideration to themselves. Nonetheless, if loaded efficiently, rootkits might help cybersecurity threats lie low by maintaining malware information off the radar of safety instruments and stopping them from exhibiting up in safety logs.
- A safety suppresor. Glupteba has a module that does its greatest to show Home windows Defender off, after which often checks to verify it hasn’t turned itself again on. It additionally appears for a laundry checklist of different safety instruments, together with anti-virus software program and system monitoring applications, killing them off to allow them to now not seek for and report anomalies.
- A virus. Glupteba makes use of two completely different variants of the ETERNALBLUE exploit to distribute itself routinely throughout your individual community, and anybody else’s it may discover by reaching out out of your pc. That makes it an old-school, self-spreading pc virus (or extra particularly a worm) slightly than only a standalone piece of malware.
- A router assault software. Glupteba bundles in numerous exploits towards fashionable house and small enterprise routers, utilizing your pc as a leaping off level to assault different individuals. It makes use of one in all these assaults to open up unpatched routers to behave as community proxies that the crooks can use as “jumping off” factors for future assaults. This leaves the unlucky sufferer wanting like an attacker themselves and exhibiting up as an obvious supply of cybercriminal exercise.
- A browser stealer. Glupteba goes after native knowledge information from 4 completely different browsers – Chrome, Firefox, Yandex and Opera – and uploads them to the crooks. Browser information typically comprise delicate info akin to URL historical past, authentication cookies, login particulars and even passwords that may’t be accessed by code akin to JavaScript operating contained in the browser. So crooks like to assault your browser from exterior, the place the browser isn’t in management.
- A cryptojacker. Together with every thing else it does, Glupteba can act as a secretive administration software for 2 completely different cryptomining instruments. Cryptominers are authorized in case you use them with the specific permission of the particular person paying the electrical energy payments to run the computer systems you’re utilizing (and cryptomining can devour plenty of energy). Right here, the crooks get you to pay their energy payments and take the cryptocoins for themselves.
There’s extra – far more
However that’s not all.
Probably the most attention-grabbing characteristic that we realized about within the report (and we expect you’ll be fascinated too) is how Glupteba makes use of the Bitcoin blockchain as a communication channel for receiving up to date configuration info.
As you in all probability know, zombies or bots aren’t a lot use to the crooks if they’ll’t name house to get their subsequent wave of directions.
Glupteba has an extended checklist of built-in malicious instructions that the crooks can set off, together with the self-explanatory update-data
and upload-file
instructions which might be detailed within the report. But it surely additionally consists of, as with most bots, generic instructions to obtain
and run
new malware, which means that even when you recognize every thing about Glupteba itself, you possibly can’t predict what it would morph into subsequent as a result of the crooks can replace the operating malware at will.
The present command-and-control servers utilized by the crooks, often known as C2 servers or C&Cs, may get discovered and blocked or killed off at any second, so zombie malware typically features a methodology for utilizing an in any other case harmless supply of information for updates.
In any case, to inform a bot to modify from one C&C server to a different, you sometimes don’t have to ship out far more than new area title or IP quantity, and there are many public messaging programs that make it straightforward to share brief snippets of information like that.
For instance, bots have used providers akin to Twitter, Reddit, Pastebin and different public web sites as momentary storage for secret messages, in the identical approach that spies from the Chilly Struggle period may need communicated utilizing the “Personals” part in a print newspaper.
Carry on the blockchain
Glupteba makes use of the truth that the Bitcoin transactions are recorded on the Bitcoin blockchain, which is a public report of transactions out there from a large number of sources which might be unexceptionably accessible from most networks.
Bitcoin “transactions” don’t really should be about cash – they’ll embody a subject known as RETURN
, also called OP_RETURN
, that’s successfully a remark of as much as 80 characters.
Let’s begin with a listing of all of the Bitcoin transaction hashes (frivolously redacted) related to one of many Bitcoin wallets used as a covert supply of messages by Glupteba.
The pockets ID proven right here was extracted from the malware by SophosLabs.
The command line program bx
under is a well-liked and helpful Bitcoin blockchain explorer software:
$ bx fetch-history 15y7......qNHXRtu5wzBpXdY5mT4RZNC6 | awk '$1 == "hash" print $2 ' dfef43552fc953ff14ca7b7bb........b79e8409b5638d4f83b1c5cec0abc3d 98987c05277c97b06edfc030c........07e74334c203075ec27b44b3cc458bf 717da8bea87d02ef62b1806cf........7e01f0267718f0351f9ae1592e02703 20b37b655133491b94a8021ab........0266d15331a14caf10570b6623a86e4 fa9cd0622535cf6c9ff449510........c5d526d5794d9d98ba5d6469a97be2c 0d83cbc74a12a9f130fcead23........d5d56cf769c6c0a4cf1cebbf9e97e4a a7fb3bb04b82922923e8359f8........3db69bd2863ec88b98f9c69a37212advert 52ee10617c1fc3e25922b146a........7daefdc3c3d5421b0387a737e46b396 f29cbbb96de80dbc7e5236c98........3da6f8118bb356f537ce0317f7ab10c 6a3a720ab97511528309fbf64........f37bc25d95d45d3408540174daad786 8bf7acc56aab4b87d73a85b46........1486f0a764fd0a5f13e2d79e0a14625 3bd54c0832cc411f5299064e4........c11ab05c1a4aff62fa323c068e88945 1e1c0249bb22d1fcfb596e4fb........df7ab3bf627e25a2fe9530eb3dce476 51899ffeadf5d0d605d5122c3........5b82baa15a4fa6b203abf59731c158f 8a7c43d0bbf01cdf3bb28de48........6e339a063251fce30cb83ae50c2096a 55e8fe62bcc41ec465c3f1f28........f5d82443a15a30d88fefc3f55ad2f29
If we fetch the main points of every of those transactions, we are able to see which of them embody OP_RETURN
knowledge.
Right here’s a transaction dump for one which does, truncated to avoid wasting area:
$ bx fetch-tx 55e8fe62bcc41ec465c3f1f28........f5d82443a15a30d88fefc3f55ad2f29 { hash 98987c05277c97b06......1ce207e74334c203075ec27b44b3cc458bf inputs { enter [ . . . . . . . . . ] output script "return [18fe788a52d7aa57808d801d0f8f7cd39e1a......9f986b877befce0c2f558f0c1a9844833ac702cb3eba6e]" [ . . . . . . . . . ] value 0 [ . . . . . . . . . ]
The bytes within the OP_RETURN
knowledge proven above are the key message.
To decrypt it, you want a 256-bit AES decryption key that’s coded into the the Glupteba malware program (you’ll find the keys within the SophosLabs paper), and you might want to know that the info returned within the blockchain consists of:
First 12 bytes = AES-256-GCM initialisation vector Final 16 bytes = AES-256-GCM authentication tag Bytes in between = Encrypted message (bytes from 0f8f7cd3... to ...877befce)
Decrypt the info from the blockcode to reverse the AES-256-GCM encryption, and also you’ll reveal the hidden message.
This kind of “hiding in plain sight” is also known as steganography.
Right here’s some pseudocode to provide the thought:
> cipher = newcipher('AES-256-GCM') > cipher.key = d8727a0e...d66503cf // extracted by SophosLabs > cipher.iv = 18fe788a52d7aa57808d801d // GCM mode wants an IV > cipher.tag = 0c2f558f0c1a9844833ac702cb3eba6e // GCM mode wants a message hash > plain = cipher:decrypt(0f8f7cd39e1a......9f986b877befce) > print('secret message is: ',plain) secret message is: venoco___ol.com // see report for full IoC checklist // this can be a new C&C server to maneuver to
And that’s how Glupteba hides its command-and-control server names in plain sight!
How dangerous is it?
The dangerous information about Glupteba is that its many self-protection parts imply that it has many tips out there to cease itself exhibiting up in your safety logs.
The excellent news is that this complexity makes the malware much less dependable, and mockingly extra vulnerable to triggering safety alarms in some unspecified time in the future.
Certainly, a number of the low-level programming tips it makes use of, together with the kernel-level rootkits, not solely don’t work on current variations of Home windows, but additionally typically draw consideration to themselves by the way in which they misbehave, as much as and together with crashing your pc with a giveaway blue display of loss of life.
Additionally, Glupteba depends on quite a few exploits that have been patched many months or years in the past – together with the assaults it makes use of towards routers – so a patched system is way much less more likely to get contaminated within the first place.
Lastly, the principle supply mechanism we’re conscious of thus far that brings infections of Glupteba right into a community (assuming you’re patched towards ETERNALBLUE and may’t get contaminated by its viral element), appears to be through “software cracks” on well-known piracy websites.
Like this one:

It led to a Glupteba an infection.
What to do?
- Patch early, patch typically. That features your working system, the apps you utilize, and any units akin to routers and file storage servers by yourself community.
- Use a good anti-virus with built-in net filtering. Most malware, together with zombie malware, arrives as a sequence of downloads. Even in case you hit by get the primary stage of malware assault, you possibly can nonetheless defeat the crooks in case you cease the ultimate payload arriving.
- Keep away from hookey software program. Assume that the kind of one who’s keen to steal software program akin to Adobe Illustrator and provides away instruments to crack it “for free” can also be keen to just accept cash from crooks to implant malware of their fraudulent downloads.
LEARN MORE ABOUT STEGANOGRAPHY
For those who loved this text, why not watch one in all our Bare Safety Stay movies wherein we focus on the extraordinary world of steganography?
You possibly can watch straight on YouTube if the video received’t play right here.
The articles referenced within the video are: