Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
139cf5ba35663fdabcde815c1b7f63d6
974858e99bf815107813cec49c795bfd
371da7e6448e94381f795f2c649d3a5d
06b965558e85444bcb3643a29170fb34
e996283e4a4a787ca2c560410ef8f6b5
SHA-256
3671a3f885f39f3793f4c88e8a54005b466e1e9b20f2a91d069cea42e25703b3
b09c80681d134a2d076c491793044e8865a34acfefbc86ac8b66e739a585c5e1
8922a21bb8ccb14d50163697eabcb685eb713f3845b0c666275dbbce0ea7c794
d551f8f0d78d6017bcd4291bc70495e45cb500402d9c45476c7af2324155a93b
eb91cd66e60f105d9c783da4d6d121b79906f4f2b702650ee444c262f16489d4
SHA1
- a814e53ee8f9fbe2adbd23e77d2c0b0798ce6453
- bf2a2567a59641bea298788c2ab3f30a4b0e2210
- 446898e4835e2304990ec8c4603d15c2cacb744a
- 3ed380fea2e4e87f81906114819cdde8f9541ea7
- 29ce10527e09b370407a8766fddf89b573ed1a5d
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.

