

Multiple Microsoft Products Vulnerabilities
January 16, 2025
CoinMiner Malware – Active IOCs
January 16, 2025
Multiple Microsoft Products Vulnerabilities
January 16, 2025
CoinMiner Malware – Active IOCs
January 16, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
ba501476d5eed368c2975c5e9976ba41
43dc8c62e9343eb01c3ffb53390e2a55
dae8814f19d340fcd846219e2dccd2e3
SHA-256
11c98c3bbf3f08f0d47153a819980189eacc20b3eaa44d2a88ec8a8aac17abda
07abbe06a2d17f142846d33bda215df5b05355148c781cb9ff1c8f233f534cbc
202efe071db5f07fc1570f9f296799dafd1bdcd29085e0b9c8c5c9e2ce1199d5
SHA1
535282f5234f5c48a05bcec25026fa32c4a05617
af544600a7cba01add858593c892c58fe8d9b024
4ed8830ae7a718672a44c82a7072676ca122a739
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.