Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: Glupteba Command-and-Control Domain Identified

📖 Overview

A potential Glupteba botnet command-and-control (C2) domain has been identified. The site currently returns a 404 response, indicating the infrastructure may have been recently decommissioned or is inactive at this time. However, historical associations suggest prior malicious use for C2 operations related to the Glupteba malware family. Confidence is assessed at 50%.


📌 Key Details

FieldInformation
TypeURL
Indicatorhttps://server14.safarimexican[.]net/
Threat TypeBotnet C2
Malwarewin.glupteba
Confidence50%
Date17 Oct 2025 – 09:01:03 UTC
Tagsc2, glupteba, URLQuery
Reporterjuroots
ReferenceURLQuery Report

🔎 URLScan Result



🛡️ Defensive Guidance

  • Block access to server14.safarimexican[.]net at all network levels (DNS, proxy, firewall).
  • Monitor for signs of Glupteba activity, including HTTP beaconing or use of proxy-related commands for persistence.
  • Check for historical connections to inactive or error-returning C2 hosts that may rotate infrastructure frequently.
  • Consider implementing behavior-based detection for Glupteba components, including PowerShell-based downloads and browser credential theft indicators.

⚠️ This IOC highlights Glupteba’s tendency to leverage transient or recycled domains as fallback C2 points. Even if inactive, such infrastructure may reappear under the same registrant patterns or reused TLS certificates in future campaigns.

Latest