

CoinMiner Malware – Active IOCs
November 6, 2025
Qilin Ransomware: Rising Threat and HBZ Breach Claim – Active IOCs
November 6, 2025
CoinMiner Malware – Active IOCs
November 6, 2025
Qilin Ransomware: Rising Threat and HBZ Breach Claim – Active IOCs
November 6, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
450b2c1de23060168de9df437e260e04
e2e7f8dc4b37168d567a6a89cf992660
42d56aedf81b5bcb99d68c65cf7fd81a
SHA-256
2968dbd64af4b7668158b729f043c71b653bec1d5e4c965359bbc662a4cd3fda
4733feaca04e871d4e0bb052f2437a2f46f10852602ea4f8b2f0170f4838dd87
2ad6ca5c2471a53baebf2d1735ff9fbfe5d6a76d963e990d75098f66cf668257
SHA1
b3b1fcd956071d35b3f6a45ae059033b429f1479
08ecca7b36aab2745437ccc97cbc298ec020a5fe
b454a92cdb02eed3858bc3c71c4e2b9d3fcf1866
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.








