30 DAYS OF FORMBOOK: DAY 26, FRIDAY 2023-06-30 - "S28Y"
NOTICE:
- Of note, the zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
NOTES:
- This the is my 26th of 30 infection runs for recent Formbook activity.
ASSOCIATED FILES:
- 2023-06-30-IOCs-for-Formbook-infection.txt.zip 2.2 kB (2,171 bytes)
- 2023-06-30-Formbook-infection-traffic.pcap.zip 7.3 MB (7,338,043 bytes)
- 2023-06-30-Formbook-malware-and-artifacts.zip 466 kB (466,406 bytes)
30 DAYS OF FORMBOOK: DAY 26, FRIDAY 2023-06-30 - "S28Y"
INFECTION CHAIN:
- Email --> attached zip archive --> extracted Formbook EXE --> victim runs Formbook EXE
MALWARE/ARTIFACTS:
- SHA256 hash: 36c59fca2be8a3be742cfa48db7112d01fc18ec1eb855e46f44a014de1726607
- File size: 231,008 bytes
- File name: PRE ALERT NOTICE#202307.zipsh
- File type: Zip archive data, at least v2.0 to extract, compression method=deflate
- File description: Zip archive containing Formbook EXE
- SHA256 hash: 215bf08032eb73c5e0b50bcce07def909e22f769315b0f90ed6cec87b28d44f6
- File size: 245,825 bytes
- File name: PRE ALERT NOTICE#202307.exe
- Persistent file location #1: C:\Users\[username]\AppData\Roaming\gluqaj\fokscx.exe
- Persistent file location #2: C:\Program Files (x86)\Bzzyxv\gdiplptor.exe
- File type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
- File description: Windows EXE for Formbook version 4.1
PERSISTENCE:
- Windows Registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Value 0 name: hqmvrbk
- Value 0 type: REG_SZ
- Value 0 Data: C:\Users\[username]\AppData\Roaming\gluqaj\fokscx.exe "C:\Users\[username]\Downloads\
PRE ALERT NOTICE#202307.exe"
- Value 1 name: NJNXQZG8VV
- Value 1 type: REG_SZ
- Value 1 Data: C:\Program Files (x86)\Bzzyxv\gdiplptor.exe
DATA STORED FOR EXFILTRATION TO FORMBOOK C2 SERVER:
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8log.ini - 0 bytes
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logim.jpeg (screenshot of desktop)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrc.ini (Outlook Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrf.ini (Firefox Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrg.ini (Chrome Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logri.ini (Iexplore Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrv.ini (__Vault Recovery)
- Note: All the above files were deleted after data exfiltation, except for first file at 0 bytes.
FORMBOOK HTTP GET AND POST REQUESTS:
- GET /s28y/?[string of alphanumeric characters with the following mixed in: = _ + and /]
- POST /s28y/
DOMAINS THAT DID NOT RESOLVE:
- DNS query for www.campinglager[.]beer - no response from DNS server
- DNS query for www.probiostarter[.]com - no response from DNS server
- DNS query for www.rttty15[.]com - no response from DNS server
- DNS query for www.vg4d0o[.]work - no response from DNS server
- DNS query for www.2auw88[.]com - response: No such name
- DNS query for www.338zt7we6i0[.]cyou - response: No such name
- DNS query for www.babyhubstore[.]com - response: No such name
- DNS query for www.brekroic[.]com - response: No such name
- DNS query for www.copythriller[.]com - response: No such name
- DNS query for www.prinicaonlinr[.]com - response: No such name
- DNS query for www.rewindrehabilitation[.]com - response: No such name
- DNS query for www.sabzevarfaj[.]sbs - response: No such name
- DNS query for www.shisokj[.]vip - response: No such name
- DNS query for www.usrinfo[.]top - response: No such name
- DNS query for www.xn--i2bwwzn[.]com - response: No such name
- DNS query for www.yijgqpi59[.]top - response: No such name
DOMAINS THAT RESOLVED, BUT NO CONNECTION TO SERVER:
- port 80 - www.fascistian[.]com - TCP SYN segments only, no response or RST from server
- port 80 - www.hotelguerneville[.]com - TCP SYN segments only, no response or RST from server
- port 80 - www.jiangwan[.]top - TCP SYN segments only, no response or RST from server
DOMAINS USED FOR FORMBOOK GET REQUESTS:
- Note: These appear to be legitimate websites or parked domain pages.
- www.1d8t[.]com
- www.86slsz[.]com
- www.airrests[.]com
- www.blahblahblahkatee[.]com
- www.blogdamuskinha[.]com
- www.coatedincoco[.]com
- www.contourbioinc[.]com
- www.farviolet[.]com
- www.gaynorvascones[.]site
- www.getwinchance[.]com
- www.hg301d[.]cfd
- www.investigatorsshow[.].net
- www.kedou25[.]com
- www.lightsoftwear[.]com
- www.m-behjati[.]com
- www.mpocash[.]mobi
- www.mvp688[.]pro
- www.nissanvideos[.]com
- www.ordukampanyalar[.]com
- www.prosblogs[.]com
- www.redbudvending[.]com
- www.relovedresses[.]com
- www.revolut[.]expert
- www.riverwoodschool[.]com
- www.sedashop[.]com
- www.serenitysuite[.]health
- www.starbytescafe[.]com
- www.tickeplate[.]com
- www.truyenfullonline[.]com
- www.visual138[.]info
- www.wexun[.]net
- www.whytry[.]shop
- www.wildcatcreekhomes[.]com
- www.youbi[.]cyou
DOMAINS USED FOR FORMBOOK GET AND POST REQUESTS:
- Note: These appear to be legitimate websites or parked domain pages.
- www.8betkrw[.]com
- www.ccxx0[.]com **
- www[.]comienzadesdecero[.]com
- www.configurableba[.]life
- www.hieblev[.]online **
- www.i8ep58[.]cfd
- www.i9bet[.]quest **
- www.litescales[.]sbs **
- www.lyrianhealth[.]com
- www.newskysupplies[.]com **
- www.ou3ejf[.]cfd
- www.readyconcreto[.]com **
** - Full stolen data (encoded) sent through HTTP POST request.
Click here to return to the main page.
