Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
25
Global rank
42 infographic chevron month
Month rank
37 infographic chevron week
Week rank
0
IOCs

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Stealer
Type
ex-USSR
Origin
1 January, 2016
First seen
11 January, 2026
Last seen
Also known as
PuffStealer
Rultazo

How to analyze Azorult with ANY.RUN

Type
ex-USSR
Origin
1 January, 2016
First seen
11 January, 2026
Last seen

IOCs

IP addresses
172.67.152.15
23.229.191.64
192.119.110.244
209.61.195.213
92.63.192.57
185.43.220.19
81.177.6.14
178.216.50.18
51.38.178.155
185.244.219.115
37.72.175.157
185.50.25.35
51.15.196.30
185.29.10.12
193.151.89.76
185.193.38.78
5.188.232.211
104.171.121.51
195.245.112.115
51.15.219.86
Hashes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worldatdoor.in
sylvaclouds.eu
corpcougar.com
evaglobal.eu
mikeservers.eu
uzocoms.eu
efore.info
corpcougar.in
modcloudserver.eu
backgrounds.pk
levitts.ug
marksidfgs.ug
tomasisa.ug
gadem.ug
fasterpdfinstall.xyz
marcakass.ug
nicolas.ug
lucab.ug
andreas.ac.ug
zaragozsa.ug
URLs
http://uga.ac.ug/index.php
http://nazima.ac.ug/dl/pmZdtegi.exe
http://cpinfo.sustainable-development-partners.com/index.php
http://171.22.30.164/papi/index.php
http://muhosransk.site/annabel/index.php
http://azla3e.shop/dbkl/index.php
http://dblg023.shop/bill1/index.php
http://45.88.66.207/purelog/Panel/index.php
http://domcomp.info/1210776429.php
http://kvaka.li/1210776429.php
http://perfecto.ac.ug/ggkanor/0mv8dc.bqmu
http://turkie.ac.ug/url/yk/rem.exe
http://171.22.30.164/smith/index.php
http://171.22.30.147/abbey/index.php
http://45.88.66.207/newone/index.php
http://boglogov.site/index.php
http://turkie.ac.ug/index.php
http://bll5e.shop/dbkl/index.php
http://45.88.66.207/oxza/index.php
http://141.98.6.162/office/index.php
Last Seen at
Last Seen at

Recent blog posts

post image
Integrating a Malware Sandbox into SOAR Workf...
watchers 719
comments 0
post image
5 Ways MSSPs Can Win Clients in 2026
watchers 619
comments 0
post image
Release Notes: AI Sigma Rules, Live Threat La...
watchers 1175
comments 0

What is AZORult malware?

AZORult is an information stealer malware that is targeted at stealing credentials and accounts. Updated multiple times over the years, AZORult continues to be an active concern for the users, stealing information such as banking passwords, credit card details, browser histories, and even cryptocurrency.

AZORult stealer was discovered, analyzed, and documented for the first time on July 26, 2016, by Proofpoint researchers. At the time, the virus was distributed together with another trojan called Chthonic. However, subsequent spam email campaigns started distributing AZORult as the main payload while Hermes and Aurora ransomware were added as additional payloads. A new strain of the stealer Trojan was documented In July 2018. The analysis revealed that it brought several upgrades to the functions of both the stealer and the loader of the virus, additionally allowing to distribute AZORult with the RIG exploit kit. The latest recorded version of the malware is v3.3. This strain was first documented in October 2018. Most notably, this strain updated a way of encrypting the C&C domain string and improved crypto-stealing function.

General description of AZORult malware

A trojan type malware originated in one of the ex-USSR countries. AZORult spyware searches for useful information on the affected computer and sends it to the C2 server to potentially steal the victim’s bank account data. AZORult can steal cookies, browser autofill information, desktop files, chat history, and more.

Interestingly, to get into a machine, the virus, in some cases, requires secondary malware like HawkEye or Seamless. Notably, after every bit of useful data is obtained in campaigns with Hermes and Aurora, user files are encrypted, and a ransom is requested to restore the lost data.

One of the interesting features of AZORult is that after execution, the malware is removed from the system due to the lack of a persistence mechanism.

Malware analysis of AZORult

ANY.RUN displays the execution process of AZORult in an interactive virtual environment. As shown by the sandbox simulation, the virus launches the following process during its execution:

  • Firstly, a Microsoft Office file opened, and WINWORD.EXE with enable macros is executed;
  • The malware runs EQNEDT32.EXE and downloads a malicious executable through the exploitation of the CVE-2017-11882 Microsoft Office Equation Editor vulnerability;
  • A kendriknk8523.exe file is then launched, which after a sleep create child process with same name;
  • A child process then proceeds to steal the personal data and connect to the CnC server.

The execution process of AZORult can be viewed in more detail in the video provided by ANY.RUN sandbox.

azorult execution process tree

Figure 1: Illustrates the life cycle of malware. Process tree generated by ANY.RUN

How to avoid infection by AZORult?

AZORult is distributed mainly using spam email campaigns or via the RIG exploit kit. Notably, a major AZORult distribution campaign was observed on July 18, 2018, targeting North America.

Spam emails that the attackers sent carried largely employment-related subjects and included an infected and password-protected resume file that triggered the download of the virus.

AZORult malware execution process

text report of the azorult malware analysis

Figure 2: A text report generated by ANY.RUN

AZORult stealer uses a clever technique to trick various antivirus engines. Particularly, the version of the stealer Trojan distributed in the July 2018 spam campaign was activated after unlocking a password-protected document. Since a password protected the document that was attached to the email, antiviruses had not been able to scan it and determine whether it was malicious or not. For the virus to become active, the victim had to unlock and enable macros for the document. In this particular campaign, the malware was distributed with two payloads embedded in the main binary. Both payloads were dropped to the disk and executed, with the first executable payload being the information gatherer – AZORult itself and then the secondary ransomware.

It should be noted that in aforecited ANY.RUN simulation AZORult uses an exploit when a Microsoft Office file is opened, allowing to embed several malicious OLE objects into a document and executes arbitrary code on a machine, and even download any file from a remote server and execute it.

How to share your AZORult malware analysis with others?

If you want to share your virus analysis with others, you can create a text report and send it to anyone you want. Just click the "Text report" button. You can save it by using a printer icon in the upper-right corner of the report, or using your browser function by clicking the "Save page as..." or "Print..." buttons. You can also download or share other malware investigations, for example Adwind or Remcos. Note that you can choose that information section in your report you want to print or save into a file using the "Print..." button by clicking in the checkbox "Add for printing" on the right side of the sections. On the illustration below, the second section won't be included in the report.

text report for azorult Figure 3: Text report

Conclusion

AZORult remains to be a hazardous trojan. The stealer Trojan has been upgraded throughout its lifespan and currently poses even more dangers than during the first days of its lifespan. Particularly, most recent versions of AZORult are distributed in bundles with ransomware and can steal cryptocurrency from the victims.

AZORult's distribution in clever email campaigns makes becoming a victim of the stealer Trojan by accident relatively easy. The interactive sandbox analysis provided by services like ANY.RUN is a great way to learn more about the threat and greatly increase cybersecurity.

HAVE A LOOK AT

Stealer screenshot
Stealer
stealer
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
Read More
 screenshot
Cephalus is a targeted ransomware threat discovered in 2025. It’s known for infiltrating organizations that deal with sensitive data through compromised RDP access. It leverages DLL sideloading with a legitimate SentinelOne executable. Cephalus is able to exfiltrate data and destroy backup options. Its payload is also tailored to each victim, which makes identification and mitigation more complex.
Read More
Latrodectus screenshot
Latrodectus
latrodectus
Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device.
Read More
NetSupport RAT screenshot
NetSupport RAT
netsupport
NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software.
Read More
Tykit screenshot
Tykit
tykit
Tykit is a sophisticated phishing-as-a-service (PhaaS) kit that emerged in May 2025, designed to steal Microsoft 365 corporate credentials through an innovative attack vector: malicious SVG files.
Read More
DragonForce screenshot
DragonForce
dragonforce
DragonForce is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model. First reported in December 2023, it encrypts files with ChaCha8, renames them with random strings, and appends “.dragonforce_encrypted.” By disabling backups, wiping recovery, and spreading across SMB shares, DragonForce maximizes damage and pressures victims into multimillion-dollar ransom negotiations. It has targeted manufacturing, construction, IT, healthcare, and retail sectors worldwide, making it a severe threat to modern enterprises.
Read More