Remcos RAT – Active IOCs
January 23, 2025Multiple Oracle Products Vulnerabilities
January 23, 2025Remcos RAT – Active IOCs
January 23, 2025Multiple Oracle Products Vulnerabilities
January 23, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
b30d2c0c5d2a7eb1d14fcbee93a3dfb5
e2fec48293a8580213ee6fa61b37b776
f1be66027399ad92d46de65f6815c69c
SHA-256
3548aa0ee0cecf920604b5d5d5c231f2a5241a012548198402e6121a43ef55f7
c419a459e0f21efa0a4df35367d1607d5999dbc28a325b9da61ed3f5f9b9ba3a
799f4e7cd415f068cb79d10621d2a038182433fdfdb4c94a2afa3887d5771688
SHA1
03a916e21638160bcc2c60a223ea6effbafbe9b6
00751d38864cfe890150b2e4d1bcd05c09bc80bc
77db0063b3f5475d649fb3922f8a97ec91be5349
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.