Custom Backdoor Leveraging Magic Packet Vulnerability in Juniper Routers
January 27, 2025MassLogger Malware – Active IOCs
January 28, 2025Custom Backdoor Leveraging Magic Packet Vulnerability in Juniper Routers
January 27, 2025MassLogger Malware – Active IOCs
January 28, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
c195c34f7ac49cf8b51bb2bb01cfb7a0
c9df09a796735038178d54fe4c071297
4af8508831c95ae77de2eaff5199d420
SHA-256
44c3fc308875ed0c6fcf4a10068e2790eb3397bb441b38ede833361312f74997
320daf03f7f2b9e697955ebc5c479c51fa3fb32caf789187c54b52749550305a
ca336807dc793ab7acd9ee58bc14d3bafa019d1ac59479e08b564a1e2ad2e1ae
SHA1
f3021f6837d161cc41590743b226a216538ee738
c01eab0d4d3f7ea3c4bef22c17c8a1c40361a721
cc7c411f18becaef8fe6da43353a294c481236a0
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.