This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Previously, AZORult was distributed through other intermediary malware such as downloaders or exploit kits. Newer versions, however, are distributed directly using malicious attachments in spam emails. These attachments use a number of techniques including macros and Dynamic Data Exchange to deliver AZORult.
Once installed, AZORult will spawn a legitimate process before injecting itself within the hollowed process to prevent detection. It will then send system data to a command and control server before monitoring any installed internet browsers for banking and cookie information. Newer variants of AZORult will also attempt to obtain Bitcoin wallet addresses, FTP or XMPP credentials and desktop files.
For further information
Threat updates
| Date | Update |
|---|---|
| 31 Jul 2018 |
AZORult has now been updated to version 3.2. The following capabilities have been added:
It also appears to be loading the Hermes ransomware as a secondary module, potential to mask its actions on an infected device. |
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
CVE Vulnerabilities
Last edited: 17 February 2020 12:38 pm