AZORult trojan disguised as Google update installer steals credentials
- AZORult hides as a Google Updater program and replaces the legitimate Google Updater program on the compromised systems.
- As the malware replaces the legitimate Google Updater program, it can achieve persistency without having to alter Windows registry or add any scheduled tasks on its own.
Researchers recently observed the AZORult information stealer malware disguised as a Google Updater program and achieving persistence by replacing the legitimate Google Updater program on the compromised systems.
Researchers from Minerva Labs, Asaf Aprozper and Gal Bitensky, detected the malware after they received a GoogleUpdate.exe binary signed with a valid certificate which was blocked by their security tool.
Fake Google Update binary
The researchers noted that the Google Updater program appeared to be legitimate, having the right icon and being signed with a non-revoked certificate.
However, upon closer inspection, the researchers found that the binary was actually signed with a certificate issued to ‘Singh Agile Content Design Limited’ instead of Google. This certificate was issued on November 19, 2019, and it has been used to sign over hundreds of fake GoogleUpdate executable binaries.
After in-depth analysis, the researchers uncovered that AZORult trojan was contained within the fake Google Update binary based on the following patterns,
- Making a HTTP POST request to a /index.php
- Using a .bit domain
- Employing the Mozilla/4.0 User-Agent that all Azorult infections use
The researchers confirmed their findings and conclusion using the malware analysis results from Intezer and VirusTotal.
As the malware disguises as a Google Updater program, it can run with administrator privileges and can achieve persistency using a highly stealthier mechanism. Moreover, since the malware replaces the legitimate Google Updater program, it can achieve persistency without having to alter the Windows registry or add any scheduled tasks on its own.
“This AZORult variant does not modify either the tasks or the registry. However, as the result of replacing the original GoogleUpdate.exe file, the malware will run with administrative privileges whenever an update is started. This also allows the malware to gain persistence that can be difficult to notice since the tasks and services are not suspicious–only the contents of the file they run,” researchers at Minerva Labs explained in a blog.
Researchers further noted that this is the first time AZORult has been associated with such a technique which disguises malware as a legitimate program.