General
-
Target
http://adfly.com
-
Sample
240531-jzncwacg82
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://adfly.com
Resource
win10v2004-20240508-en
Malware Config
Extracted
azorult
http://boglogov.site/index.php
Targets
-
-
Target
http://adfly.com
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Modifies boot configuration data using bcdedit
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
4