

Quasar RAT aka CinaRAT – Active IOCs
October 14, 2025
Multiple NVIDIA Display Driver Vulnerabilities
October 14, 2025
Quasar RAT aka CinaRAT – Active IOCs
October 14, 2025
Multiple NVIDIA Display Driver Vulnerabilities
October 14, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
0add99d7e72357a5c4901b624d51bf75
cae8e4d3e3001415e385523436d46ac4
c63cd949a100bae516b20ac4205b1eb4
SHA-256
1b6922ac59427b0bbadfa83023c06054978fb0c737b6891c3be47a298bd8c686
460392ef258d9b4c5546ab88ecd57491ae16c5f3e34d26e688de977d930f4be5
c2d1a5a0551041c5a7dc23337a8e99c53d56065669f53b0d48756350b8ff812f
SHA1
840b6571111bb08a92ef495d423aba634b573b8b
8d00a5c138ea2219707eef7527a8685a357dd7fb
138609c954b106f51b572cbd437fc631a17052fa
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.








