gubepy.exe

Glary Utilities

Glarysoft LTD

The application gubepy.exe, “Glary Utilities AutoUpdate” by Glarysoft has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler triggered daily at a specified time. While running, it connects to the Internet address server-54-230-206-140.atl50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Glarysoft LTD  (signed and verified)

Product:
Glary Utilities

Description:
Glary Utilities AutoUpdate

Version:
5, 0, 0, 8

MD5:
2380e80f617aa0891aa1e1dd02e79646

SHA-1:
75e15537703ff2c22f43c5fe680bf413a1e05664

SHA-256:
2d7123f08249c394d60c51025c41bf3a165f2fb311ee3acecdae5807dfa2dcb8

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 11:30:03 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.GlarySoft.AU
16.10.17.23

File size:
761 KB (779,304 bytes)

Product version:
5.0.0.1

Copyright:
Copyright (c) 2003-2014 Glarysoft Ltd

File type:
Executable application (Win32 EXE)

Language:
Chinese (Simplified, PRC)

Common path:
C:\Program Files\jozerentnibas\gubepy.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/5/2016 5:30:00 AM

Valid to:
2/5/2019 5:29:59 AM

Subject:
CN=Glarysoft LTD, O=Glarysoft LTD, L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
60C19744D4DA5603BB57F39C75816E5B

File PE Metadata
Compilation timestamp:
5/15/2014 12:12:36 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:kBhvKRuGiIGrm+Su8DzIr+EuK4LXJXgaUxoJG4TYTQamBJpSmz:qi0GiIL+SPEuK4LXlb0uG4TYTHSp9z

Entry address:
0x347DD

Entry point:
E8, BB, 5D, 00, 00, E9, 79, FE, FF, FF, 3B, 0D, 40, 66, 46, 00, 75, 02, F3, C3, E9, 3D, 5E, 00, 00, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 57, 33, FF, 3B, F7, 75, 04, 33, C0, EB, 65, 39, 7D, 08, 75, 1B, E8, 14, 1F, 00, 00, 6A, 16, 5E, 89, 30, 57, 57, 57, 57, 57, E8, 65, 08, 00, 00, 83, C4, 14, 8B, C6, EB, 45, 39, 7D, 10, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, 00, 5F, 00, 00, 83, C4, 0C, EB, C1, FF, 75, 0C, 57, FF, 75, 08, E8, 9F, 24, 00, 00, 83, C4, 0C, 39, 7D, 10, 74, B6, 39, 75, 0C, 73...
 
[+]

Entropy:
7.1617

Code size:
323 KB (330,752 bytes)

Scheduled Task
Task name:
Rotockclajent Core

Trigger:
Daily (Runs daily at 01:27:34)

Description:
The core of Rotockclajent, all functions depend it.


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-37-52.jfk1.r.cloudfront.net  (54.192.37.52:80)

TCP (HTTP):
Connects to server-52-84-33-34.ewr50.r.cloudfront.net  (52.84.33.34:80)

TCP (HTTP):
Connects to server-52-84-33-181.ewr50.r.cloudfront.net  (52.84.33.181:80)

TCP (HTTP):
Connects to server-54-230-95-108.fra2.r.cloudfront.net  (54.230.95.108:80)

TCP (HTTP):
Connects to server-54-230-81-18.mia50.r.cloudfront.net  (54.230.81.18:80)

TCP (HTTP):
Connects to server-54-230-81-102.mia50.r.cloudfront.net  (54.230.81.102:80)

TCP (HTTP):
Connects to server-54-230-51-85.jfk5.r.cloudfront.net  (54.230.51.85:80)

TCP (HTTP):
Connects to server-54-230-51-163.jfk5.r.cloudfront.net  (54.230.51.163:80)

TCP (HTTP):
Connects to server-54-230-206-30.atl50.r.cloudfront.net  (54.230.206.30:80)

TCP (HTTP):
Connects to server-54-230-206-140.atl50.r.cloudfront.net  (54.230.206.140:80)

TCP (HTTP):
Connects to server-54-230-163-163.jax1.r.cloudfront.net  (54.230.163.163:80)

TCP (HTTP):
Connects to server-54-230-141-95.sfo5.r.cloudfront.net  (54.230.141.95:80)

TCP (HTTP):
Connects to server-54-192-37-175.jfk1.r.cloudfront.net  (54.192.37.175:80)

TCP (HTTP):
Connects to server-54-192-37-164.jfk1.r.cloudfront.net  (54.192.37.164:80)

TCP (HTTP):
Connects to server-54-192-25-198.mxp4.r.cloudfront.net  (54.192.25.198:80)

TCP (HTTP):
Connects to server-52-85-94-87.jfk5.r.cloudfront.net  (52.85.94.87:80)

TCP (HTTP):
Connects to server-52-85-94-184.jfk5.r.cloudfront.net  (52.85.94.184:80)

TCP (HTTP):
Connects to server-52-85-94-176.jfk5.r.cloudfront.net  (52.85.94.176:80)

TCP (HTTP):
Connects to server-52-85-94-172.jfk5.r.cloudfront.net  (52.85.94.172:80)

TCP (HTTP):
Connects to server-52-85-94-110.jfk5.r.cloudfront.net  (52.85.94.110:80)

Remove gubepy.exe - Powered by Reason Core Security