BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
15
Global rank
38 infographic chevron month
Month rank
37 infographic chevron week
Week rank
3271
IOCs

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Stealer
Type
ex-USSR
Origin
1 January, 2016
First seen
18 May, 2024
Last seen
Also known as
PuffStealer
Rultazo

How to analyze Azorult with ANY.RUN

Type
ex-USSR
Origin
1 January, 2016
First seen
18 May, 2024
Last seen

IOCs

IP addresses
185.196.10.233
141.98.6.72
172.67.152.15
162.240.230.249
23.229.191.64
192.119.110.244
2.56.59.196
45.95.168.162
31.210.20.167
203.159.80.136
194.147.142.232
141.255.144.149
194.5.177.120
85.204.74.152
23.106.124.196
66.151.174.10
176.195.137.101
107.189.10.150
95.181.178.80
51.68.178.28
Hashes
c331ec3b22d99e009996d930b6e8f4af478918e947fe3f0d0cb26d0ca2067aaa
aca7a7d812ac2192255aa3d47477f13b05963da0383e459d6b09d1630cd11aae
bfefbcaec340cf37802b09ece6b6f48906575f5ad21c1fd447103bf0c7b86e25
16495e3c7dc157fb17b808e31db3f6c6339a398c80bf6c2229cc7e0c22fed3fe
42d6ad70b55d487b04cb7681d6e1b6b7020a9ec18bd79fc02ee6844fb522f0d9
102e1faf847d864c477040faceaf143af7ad1c89f55a7b6093a7820b72f35ff5
4055d4161b8835874a001a7a1dfe2f4eb68b00d4eb446b2f0c10e5805bf99adc
69cee00fd47dbf3bf3625734286d0f97a271d0a3021839e573db84aa7d223184
219127a497d6e17a1fb4f64a9e4b2d6b109fbdb91cb17e703ae9bf35be2993f1
5629215f0583fd1a92b2f4fc2de1bdf11bd94cb30401ab914276b9ba0a392fcb
429bb6ee7e4e484e258da7643ac1772db9b02ad655d3cc66d763b0afe3e5a785
7c3b1e781d3d8edecb2a4d8d8da4b2380e63c4befdfa56f045b1ed3fa2ca208a
5efacff7fa2a0a6a58097f0a19ba34788d832647060b51aa10365a25b5f9a563
3208b7940ca3be4d50228edd4d1d2b0f4a21df9d2e84d25a41c75ac074936215
a51c2376e215b58de6fb4bfa24500448a5f97eecf679374f59516b0c3c89f268
37d4d7a7b84e4f6ead2e950ba252c23fa360a3176f49184942da3046fa693452
698c71dfff3a76279617638fa1c69d4b562484409434c63250ebb706f31318de
72dd053427dd0cc5c78f9ee5a9d8a2e9381855a17b7e32ad63e760893240fa31
13a721ad46cfe0131e3089ee1df6f7b9e824db76548819b7c2000d0a58030ad6
6471f1c24df8a904cc1082929f46c4acfd9ce5e93128b74e50968b627580ea81
Domains
topgamecheats.dev
jotunheim.name
svartalfheim.top
applereports.ddns.net
platitinas.ac.ug
masontralacs.ug
petronian.ac.ug
marcapinyo.ug
chika1992.xyz
wwwwwwwwwww.co.vu
e4v5sa.xyz
5desconcertais.sa.com
sh1000816.had.su
nesk.zzz.com.ua
tragee.000webhostapp.com
grandmasson.pw
kaso.cf
whyuneedcrackfakesitehaha.000webhostapp.com
emails-blockchain.com
vc.kunwersachdev.com
URLs
http://0x21.in:8000/_az/
http://ehzwq.shop/BL134/index.php
http://boglogov.site/index.php
http://5gw4d.xyz/PL341/index.php
http://lastimaners.ug/asdfg.exe
http://marksidfgs.ug/net.exe
http://mistitis.ug/native.exe
http://91.215.85.223/ghjkl.exe
http://lastimaners.ug/ghjk.exe
http://91.215.85.223/ghjk.exe
http://manulop.ac.ug/index.php
http://91.215.85.223/zxcvb.exe
http://marksidfgs.ug/ghjkl.exe
http://opesjk.ug/native.exe
http://45.88.78.37/index.php
http://lastimaners.ug/zxcv.EXE
http://lastimaners.ug/asdf.EXE
http://lastimaners.ug/zxcvb.exe
http://timecheck.ug/ppx.ps1
http://91.215.85.223/asdfg.exe
Last Seen at

Recent blog posts

post image
A Guide to ANY.RUN’s YARA Search 
watchers 171
comments 0
post image
Celebrate ANY.RUN’s 8th Birthday with Special...
watchers 197
comments 0
post image
How to Use Threat Intelligence Feeds
watchers 605
comments 0

What is AZORult malware?

AZORult is an information stealer malware that is targeted at stealing credentials and accounts. Updated multiple times over the years, AZORult continues to be an active concern for the users, stealing information such as banking passwords, credit card details, browser histories, and even cryptocurrency.

AZORult stealer was discovered, analyzed, and documented for the first time on July 26, 2016, by Proofpoint researchers. At the time, the virus was distributed together with another trojan called Chthonic. However, subsequent spam email campaigns started distributing AZORult as the main payload while Hermes and Aurora ransomware were added as additional payloads. A new strain of the stealer Trojan was documented In July 2018. The analysis revealed that it brought several upgrades to the functions of both the stealer and the loader of the virus, additionally allowing to distribute AZORult with the RIG exploit kit. The latest recorded version of the malware is v3.3. This strain was first documented in October 2018. Most notably, this strain updated a way of encrypting the C&C domain string and improved crypto-stealing function.

General description of AZORult malware

A trojan type malware originated in one of the ex-USSR countries. AZORult spyware searches for useful information on the affected computer and sends it to the C2 server to potentially steal the victim’s bank account data. AZORult can steal cookies, browser autofill information, desktop files, chat history, and more.

Interestingly, to get into a machine, the virus, in some cases, requires secondary malware like HawkEye or Seamless. Notably, after every bit of useful data is obtained in campaigns with Hermes and Aurora, user files are encrypted, and a ransom is requested to restore the lost data.

One of the interesting features of AZORult is that after execution, the malware is removed from the system due to the lack of a persistence mechanism.

Malware analysis of AZORult

ANY.RUN displays the execution process of AZORult in an interactive virtual environment. As shown by the sandbox simulation, the virus launches the following process during its execution:

  • Firstly, a Microsoft Office file opened, and WINWORD.EXE with enable macros is executed;
  • The malware runs EQNEDT32.EXE and downloads a malicious executable through the exploitation of the CVE-2017-11882 Microsoft Office Equation Editor vulnerability;
  • A kendriknk8523.exe file is then launched, which after a sleep create child process with same name;
  • A child process then proceeds to steal the personal data and connect to the CnC server.

The execution process of AZORult can be viewed in more detail in the video provided by ANY.RUN sandbox.

azorult execution process tree

Figure 1: Illustrates the life cycle of malware. Process tree generated by ANY.RUN

How to avoid infection by AZORult?

AZORult is distributed mainly using spam email campaigns or via the RIG exploit kit. Notably, a major AZORult distribution campaign was observed on July 18, 2018, targeting North America.

Spam emails that the attackers sent carried largely employment-related subjects and included an infected and password-protected resume file that triggered the download of the virus.

AZORult malware execution process

text report of the azorult malware analysis

Figure 2: A text report generated by ANY.RUN

AZORult stealer uses a clever technique to trick various antivirus engines. Particularly, the version of the stealer Trojan distributed in the July 2018 spam campaign was activated after unlocking a password-protected document. Since a password protected the document that was attached to the email, antiviruses had not been able to scan it and determine whether it was malicious or not. For the virus to become active, the victim had to unlock and enable macros for the document. In this particular campaign, the malware was distributed with two payloads embedded in the main binary. Both payloads were dropped to the disk and executed, with the first executable payload being the information gatherer – AZORult itself and then the secondary ransomware.

It should be noted that in aforecited ANY.RUN simulation AZORult uses an exploit when a Microsoft Office file is opened, allowing to embed several malicious OLE objects into a document and executes arbitrary code on a machine, and even download any file from a remote server and execute it.

How to share your AZORult malware analysis with others?

If you want to share your virus analysis with others, you can create a text report and send it to anyone you want. Just click the "Text report" button. You can save it by using a printer icon in the upper-right corner of the report, or using your browser function by clicking the "Save page as..." or "Print..." buttons. You can also download or share other malware investigations, for example Adwind or Remcos. Note that you can choose that information section in your report you want to print or save into a file using the "Print..." button by clicking in the checkbox "Add for printing" on the right side of the sections. On the illustration below, the second section won't be included in the report.

text report for azorult Figure 3: Text report

Conclusion

AZORult remains to be a hazardous trojan. The stealer Trojan has been upgraded throughout its lifespan and currently poses even more dangers than during the first days of its lifespan. Particularly, most recent versions of AZORult are distributed in bundles with ransomware and can steal cryptocurrency from the victims.

AZORult's distribution in clever email campaigns makes becoming a victim of the stealer Trojan by accident relatively easy. The interactive sandbox analysis provided by services like ANY.RUN is a great way to learn more about the threat and greatly increase cybersecurity.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy