Thursday, January 30, 2025
HomeCyber AttackAzorult Malware Abuses Google Sites To Steal Login Credentials

Azorult Malware Abuses Google Sites To Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

A new evasive Azorult campaign that uses HTML smuggling to deliver a malicious JSON payload from an external website. 

The JSON file is then loaded using reflective code loading, a fileless technique that bypasses disk-based detection and also employs an AMSI bypass to avoid being flagged by antivirus software. 

A sophisticated campaign targets the healthcare industry and steals sensitive information, including login credentials, crypto wallet data, and browser information.  

Google Sites Exploited For HTML Smuggling Attacks 

Adversaries launched an attack using HTML smuggling within fake Google Docs pages on Google Sites, which tricked victims into downloading a malicious payload disguised as a legitimate Google Doc, Netskope said.

Unlike typical HTML smuggling where the payload resides in Javascript, this instance embedded the base64-encoded payload within a separate JSON file hosted on a different domain. 

Upon visiting the website, the victim’s browser unknowingly downloads the JSON and extracts the malicious payload. 

An attacker’s website bypasses scanners with a CAPTCHA and delivers HTML that downloads a disguised LNK shortcut. 

The LNK triggers a Powershell script to download a base64 encoded payload, decodes it, creates a scheduled task to execute the script, and then deletes it. 

The downloaded Javascript copies itself checks for a specific file for self-deletion and fetches two more Powershell scripts to execute.  

Attackers leverage reflective code loading to evade detection. They use two Powershell scripts, agent1.ps1 and agent3.ps1. Agent1.ps1 disables AMSI scanning. 

Agent3.ps1 downloads an Azorult loader and shellcode in memory allocates memory for them, and uses CreateThread to execute them within the same process. 

The downloaded loader then retrieves another Powershell script, sd2.ps1, which decrypts and executes the Azorult binary stored within itself.  

Azorult, a.NET infostealer, targets sensitive user data, and after in-memory execution, it steals credentials, browser data, and crypto wallet information, leveraging Curve25519 cryptography to encrypt stolen data for stealthy exfiltration to the C2 server via HTTP. 

It first captures a full-screen screenshot, and then it pilfers browser data (logins, cookies, browsing history) from Chrome and Firefox by copying specific files, and then it hunts for popular crypto wallet extensions on Chrome, Edge, and Firefox and exfiltrates their data if found. 

Sensitive Documents

Target File Extension
File Name Keywords
Unwanted File extension

Azorult scans the desktop for sensitive files based on extensions and keywords and it bypasses specific file types while searching. Upon finding a target file, it reads its content and stores it in memory. 

The data is compressed and encrypted using a pre-shared secret before transmission, and the WebRequest class is leveraged to send the encrypted data along with the public key over HTTPS to the attacker’s command and control server. 

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...