Azorult

Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. [1][2]

ID: S0344
Type: MALWARE
Platforms: Windows
Version: 1.3
Created: 30 January 2019
Last Modified: 13 October 2022

Techniques Used

Domain ID Name Use
Enterprise T1555 .003 从密码存储中获取凭证: Credentials from Web Browsers

Azorult can steal credentials from the victim's browser.[1]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

Azorult can encrypt C2 traffic using XOR.[1][2]

Enterprise T1140 反混淆/解码文件或信息

Azorult uses an XOR key to decrypt content and uses Base64 to decode the C2 address.[1][2]

Enterprise T1113 屏幕捕获

Azorult can capture screenshots of the victim’s machines.[1]

Enterprise T1083 文件和目录发现

Azorult can recursively search for files in folders and collects files from the desktop with certain extensions.[1]

Enterprise T1552 .001 未加密凭证: Credentials In Files

Azorult can steal credentials in files belonging to common software such as Skype, Telegram, and Steam.[1]

Enterprise T1012 查询注册表

Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall.[1]

Enterprise T1070 .004 移除指标: File Deletion

Azorult can delete files from victim machines.[1]

Enterprise T1082 系统信息发现

Azorult can collect the machine information, system architecture, the OS version, computer name, Windows product name, the number of CPU cores, video card information, and the system language.[1][2]

Enterprise T1033 系统所有者/用户发现

Azorult can collect the username from the victim’s machine.[1]

Enterprise T1124 系统时间发现

Azorult can collect the time zone information from the system.[1][2]

Enterprise T1016 系统网络配置发现

Azorult can collect host IP information from the victim’s machine.[1]

Enterprise T1134 .002 访问令牌操控: Create Process with Token

Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges.[1]

Enterprise T1105 输入工具传输

Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.[1][2]

Enterprise T1057 进程发现

Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot.[1][2]

Enterprise T1055 .012 进程注入: Process Hollowing

Azorult can decrypt the payload into memory, create a new suspended process of itself, then inject a decrypted payload to the new process and resume new process execution.[1]

Groups That Use This Software

ID Name References
G0092 TA505

[3]

References