Rewterz Releases Annual Threat Intelligence Report 2024 Highlighting Key Cybersecurity Trends and Threat Actor Activity
April 21, 2025CVE-2025-3785 – D-Link DWR-M961 Vulnerability
April 21, 2025Rewterz Releases Annual Threat Intelligence Report 2024 Highlighting Key Cybersecurity Trends and Threat Actor Activity
April 21, 2025CVE-2025-3785 – D-Link DWR-M961 Vulnerability
April 21, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
8578c6170e697bf1bdb0f7c173afef09
ed839760dcc521b8f2dc4025836ede79
88d137b75b41e8706deae0ef91f4f9a4
SHA-256
91e26a1d45caaa698ef2e46e4630f3a153bac0e86df427db96a5ab94f9419fd0
682d77e301efe76c076423cfa323ace12a4adb04fa0b8886b154684f89e983cb
9b00edc001610c6b5a2e2495226c8bdde0eec09e420964f996a1faefa71c404a
SHA1
a69c5fffd403f951030b19791e875be09eefec6f
6ca4fe33eb656eb20ff193c8418bdd0cd725d711
9608e8010e48b5ceb5435e36ee6dc03166048d8c
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.