Severity
Medium
Analysis Summary
Active IoCs have been retrieved linked to the Azorult malware, that target and infect victims with the Azorult stealer. AZORult is a Trojan stealer that collects various data on infected computers and sends it to the C&C server, including browser history, login credentials, cookies, files from folders as specified by the C&C server (for example, all TXT files from the Desktop folder), cryptowallet files, etc.
Impact
- Credential Theft
- Exposure of sensitive information
Indicators of Compromise
URL
- https[:]//gandokiblit[.]pw/well-knowns/wewe/index[.]php
- http[:]//168[.]119[.]251[.]131/index[.]php
- http[:]//mkontakt[.]az/111[.]exe
- http[:]//70[.]35[.]203[.]53/index[.]php
- http[:]//45[.]76[.]167[.]250/index[.]php
- http[:]//dancedance[.]ac[.]ug/index[.]php
- http[:]//dancedance[.]ac[.]ug/ds1[.]exe
- http[:]//dancedance[.]ac[.]ug/ac[.]exe
- http[:]//185[.]215[.]113[.]77/acxvtgdhf[.]exe
- http[:]//marianne[.]ac[.]ug/sqlite3[.]dll
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.