

- Azor phone 2 cases update#
- Azor phone 2 cases code#
- Azor phone 2 cases password#
- Azor phone 2 cases download#
The following POST is an initial client-to-server communication, where the client sends an initial checkin request and the server responds with data XOR-encoded with a 3-byte key (The XOR key in this case was \x0d0ac8).
Azor phone 2 cases code#
While there were many code changes to the malware, we focused on analyzing the updated command and control (C&C) communication protocol.
Azor phone 2 cases download#
Once the recipient opens the password-protected document and enables the embedded macros, the macros download AZORult. Improved means of stealing cryptocurrency wallets and credentials in the new version of AZORult might also provide a connection to TA516’s demonstrated interests in cryptocurrencies. In 2017 we presented research on TA516 and ways in which this actor used documents with similar resume lures to download banking Trojans or a Monero miner. We attribute this campaign to an actor we track as TA516. Once potential victims enter the password, they also need to enable macros for the document to download AZORult, which in turn downloads the Hermes 2.1 ransomware payload.įigure 2: Document attachment used in the July 18 campaign
Azor phone 2 cases password#
This technique is an attempt to evade various antivirus engines, since the document itself is not malicious until the password is entered successfully. The password was included in the body of the original email and, in this case, was ‘789’, as visible in Figure 1 above. The documents in this campaign were password-protected. The attached documents used file names in the format of “firstname.surname_resume.doc”.įigure 1: Email used in the July 18 campaign The messages used employment-related subjects such as “About a role” and “Job Application”.
Azor phone 2 cases update#
On July 18, 2018, one day after the AZORult update above was announced, we observed a campaign delivering thousands of messages targeting North America that used the new version of AZORult.

In the admin panel, you can specify the rules for how the loader works.

It is noteworthy that within a day of the new update appearing on underground forums, a prolific actor used the new version in a large email campaign, leveraging its new capabilities to distribute Hermes ransomware. Recently, AZORult authors released a substantially updated version, improving both on its stealer and downloader functionality. We have since observed many instances of AZORult dropped via exploit kits and in fairly regular email campaigns as both a primary and secondary payload.

AZORult is a robust information stealer & downloader that Proofpoint researchers originally identified in 2016 as part of a secondary infection via the Chthonic banking Trojan.
