Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
10792033a3550529536af5ab9bf98688
53d55a3675ab1f752e8dd9e98f2cf8e9
fcae87087ca2056ce1ad3ccaf87979b0
e8195102dd4aa92822a0facdf6d7524d
SHA-256
815278833a20e95cd14f6ab44f46b46f2eb22d224742220bf2c4ad753afdbf38
915a73abac69dccfa57f93ed1a98b46669b0c4d9ff8ebd4552ba1243d33891bc
d08410a7c99152b4b46a8f6e686353d0a0a0be18eff6358322b72c28e43bda53
2b973dd6686e5fdc533eb55644bf25fc5deefb87eee67f325474d0be3cc53561
SHA1
- 23d93ed92bf24834869c9a937dc999fe9e1d61b1
- d66ea9fe854f25ce6c0a3c4cd7d49f79ae3e81cd
- 4b32307906306685245e8a5b26317db510c67ae0
- e2788b9bf9c7d2cbf45269a7b60cc8af50578f31
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.

