BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
15
Global rank
42 infographic chevron month
Month rank
50 infographic chevron week
Week rank
3503
IOCs

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Stealer
Type
ex-USSR
Origin
1 January, 2016
First seen
29 April, 2024
Last seen
Also known as
PuffStealer
Rultazo

How to analyze Azorult with ANY.RUN

Type
ex-USSR
Origin
1 January, 2016
First seen
29 April, 2024
Last seen

IOCs

IP addresses
185.196.10.233
94.156.8.44
217.63.234.90
141.98.6.72
172.67.152.15
162.240.230.249
23.229.191.64
192.119.110.244
31.210.20.167
203.159.80.136
194.147.142.232
45.95.168.162
185.79.156.15
2.56.59.196
37.0.10.210
185.79.156.23
172.86.120.238
141.255.144.149
194.5.177.120
85.204.74.152
Hashes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jotunheim.name
applereports.ddns.net
masontralacs.ug
platitinas.ac.ug
petronian.ac.ug
marcapinyo.ug
svartalfheim.top
chika1992.xyz
wwwwwwwwwww.co.vu
e4v5sa.xyz
parnakol.ug
vh314957.eurodir.ru
lookoutcraamp.com
whyuneedcrackfakesitehaha.000webhostapp.com
kamyn9ka.com
fileforyou.host
sery.ga
sh1000816.had.su
razvalina.xyz
veritynova.com
URLs
http://5gw4d.xyz/PL341/index.php
http://opesjk.ug/native.exe
http://manulop.ac.ug/index.php
http://marksidfgs.ug/ghjkl.exe
http://91.215.85.223/asdfg.exe
http://91.215.85.223/native.exe
http://91.215.85.223/ghjkl.exe
http://lastimaners.ug/zxcvb.exe
http://opesjk.ug/net.exe
http://lastimaners.ug/ghjk.exe
http://lastimaners.ug/asdfg.exe
http://ccrhs.shop/MI341/index.php
http://opsdjs.ug/ghjkl.exe
http://91.215.85.223/net.exe
http://partadino.ac.ug/ghjkl.exe
http://partadino.ac.ug/ghjk.exe
http://opesjk.ug/asdfg.exe
http://195.245.112.115/index.php
http://gigaload.info/1210776429.php
http://safetygear.pk/ghjk.exe
Last Seen at

Recent blog posts

post image
New Redline Version: Uses Lua Bytecode, Propa...
watchers 713
comments 0
post image
Find Malware by File Contents with YARA Searc...
watchers 1347
comments 0
post image
Cybercriminals Exploit Google Ads to Spread I...
watchers 655
comments 0

What is AZORult malware?

AZORult is an information stealer malware that is targeted at stealing credentials and accounts. Updated multiple times over the years, AZORult continues to be an active concern for the users, stealing information such as banking passwords, credit card details, browser histories, and even cryptocurrency.

AZORult stealer was discovered, analyzed, and documented for the first time on July 26, 2016, by Proofpoint researchers. At the time, the virus was distributed together with another trojan called Chthonic. However, subsequent spam email campaigns started distributing AZORult as the main payload while Hermes and Aurora ransomware were added as additional payloads. A new strain of the stealer Trojan was documented In July 2018. The analysis revealed that it brought several upgrades to the functions of both the stealer and the loader of the virus, additionally allowing to distribute AZORult with the RIG exploit kit. The latest recorded version of the malware is v3.3. This strain was first documented in October 2018. Most notably, this strain updated a way of encrypting the C&C domain string and improved crypto-stealing function.

General description of AZORult malware

A trojan type malware originated in one of the ex-USSR countries. AZORult spyware searches for useful information on the affected computer and sends it to the C2 server to potentially steal the victim’s bank account data. AZORult can steal cookies, browser autofill information, desktop files, chat history, and more.

Interestingly, to get into a machine, the virus, in some cases, requires secondary malware like HawkEye or Seamless. Notably, after every bit of useful data is obtained in campaigns with Hermes and Aurora, user files are encrypted, and a ransom is requested to restore the lost data.

One of the interesting features of AZORult is that after execution, the malware is removed from the system due to the lack of a persistence mechanism.

Malware analysis of AZORult

ANY.RUN displays the execution process of AZORult in an interactive virtual environment. As shown by the sandbox simulation, the virus launches the following process during its execution:

  • Firstly, a Microsoft Office file opened, and WINWORD.EXE with enable macros is executed;
  • The malware runs EQNEDT32.EXE and downloads a malicious executable through the exploitation of the CVE-2017-11882 Microsoft Office Equation Editor vulnerability;
  • A kendriknk8523.exe file is then launched, which after a sleep create child process with same name;
  • A child process then proceeds to steal the personal data and connect to the CnC server.

The execution process of AZORult can be viewed in more detail in the video provided by ANY.RUN sandbox.

azorult execution process tree

Figure 1: Illustrates the life cycle of malware. Process tree generated by ANY.RUN

How to avoid infection by AZORult?

AZORult is distributed mainly using spam email campaigns or via the RIG exploit kit. Notably, a major AZORult distribution campaign was observed on July 18, 2018, targeting North America.

Spam emails that the attackers sent carried largely employment-related subjects and included an infected and password-protected resume file that triggered the download of the virus.

AZORult malware execution process

text report of the azorult malware analysis

Figure 2: A text report generated by ANY.RUN

AZORult stealer uses a clever technique to trick various antivirus engines. Particularly, the version of the stealer Trojan distributed in the July 2018 spam campaign was activated after unlocking a password-protected document. Since a password protected the document that was attached to the email, antiviruses had not been able to scan it and determine whether it was malicious or not. For the virus to become active, the victim had to unlock and enable macros for the document. In this particular campaign, the malware was distributed with two payloads embedded in the main binary. Both payloads were dropped to the disk and executed, with the first executable payload being the information gatherer – AZORult itself and then the secondary ransomware.

It should be noted that in aforecited ANY.RUN simulation AZORult uses an exploit when a Microsoft Office file is opened, allowing to embed several malicious OLE objects into a document and executes arbitrary code on a machine, and even download any file from a remote server and execute it.

How to share your AZORult malware analysis with others?

If you want to share your virus analysis with others, you can create a text report and send it to anyone you want. Just click the "Text report" button. You can save it by using a printer icon in the upper-right corner of the report, or using your browser function by clicking the "Save page as..." or "Print..." buttons. You can also download or share other malware investigations, for example Adwind or Remcos. Note that you can choose that information section in your report you want to print or save into a file using the "Print..." button by clicking in the checkbox "Add for printing" on the right side of the sections. On the illustration below, the second section won't be included in the report.

text report for azorult Figure 3: Text report

Conclusion

AZORult remains to be a hazardous trojan. The stealer Trojan has been upgraded throughout its lifespan and currently poses even more dangers than during the first days of its lifespan. Particularly, most recent versions of AZORult are distributed in bundles with ransomware and can steal cryptocurrency from the victims.

AZORult's distribution in clever email campaigns makes becoming a victim of the stealer Trojan by accident relatively easy. The interactive sandbox analysis provided by services like ANY.RUN is a great way to learn more about the threat and greatly increase cybersecurity.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy