AZORult spreads as a fake ProtonVPN installer

AZORult spreads as a fake ProtonVPN installer

AZORult has its history. However, a few days ago, we discovered what appears to be one of its most unusual campaigns: abusing the ProtonVPN service and dropping malware via fake ProtonVPN installers for Windows.


Screenshot of a fake ProtonVPN website


The campaign started at the end of November 2019 when the threat actor behind it registered a new domain under the name protonvpn[.]store. The Registrar used for this campaign is from Russia.


We have found that at least one of the infection vectors is through affiliation banners networks (Malvertising).


When the victim visits a counterfeit website and downloads a fake ProtonVPN installer for Windows, they receive a copy of the Azorult botnet implant.



The Website is an HTTrack copy of the original ProtonVPN website as shown below.



Once the victim runs the implant, it collects the infected machine’s environment information and reports it to the C2, located on the same accounts[.]protonvpn[.]store server.


{
"config: ": [
"MachineID :",
"EXE_PATH :",
"Windows :",
"Computer(Username) :",
"Screen:",
"Layouts:",
"LocalTime:",
"Zone:",
"[Soft]",
"Host: User-Agent: Accept: ; charset=Content-Type: HTTP/1.0POST text/*utf-8text/htmlHTTP/Proxy-AuthenticateAcceptContent-TypeContent-Lengthrealmhttp::Connection::connect: using proxy %1%http::Connection::connect: testing %1% for proxy routing"
]
}

In their greed, the threat ac ..

Support the originator by clicking the read the rest link below.