2018-02-16 - FORMBOOK INFECTION
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- Zip archive of the pcap: 2018-02-16-Formbook-infection-traffic.pcap.zip 919.3 kB (919,310 bytes)
- 2018-02-16-Formbook-infection-traffic.pcap (1,285,123 bytes)
- Zip archive of the email and malware: 2018-02-16-Formbook-email-and-malware.zip 844.7 kB (844,653 bytes)
- 2018-02-16-extracted-Formbook-malware.exe (495,616 bytes)
- 2018-02-16-malspam-attachment.zip (277,181 bytes)
- 2018-02-16-malspam-pushing-Formbook-1228-UTC.eml (384,353 bytes)
WEB TRAFFIC BLOCK LIST
Indicators are not a block list, especially since the associated domains appear to be legitimate websites. If you feel the need to block web traffic, I suggest the following partial URLs:
- hxxp[:]//www.885mt[.]com/m02/
- hxxp[:]//www.blitzathletics[.]fitness/m02/
- hxxp[:]//www.clevelandtaxaccountant[.]com/m02/
- hxxp[:]//www.deliciousvillefoods[.]com/m02/
- hxxp[:]//www.discovertellus[.]com/m02/
- hxxp[:]//www.erfenbu[.]com/m02/
- hxxp[:]//www.hemalipaterl[.]com/m02/
- hxxp[:]//www.jueduizan[.]com/m02/
- hxxp[:]//www.karselasansor[.]com/m02/
- hxxp[:]//www.kinketsukun[.]com/m02/
- hxxp[:]//www.navstyle[.]com/m02/
- hxxp[:]//www.siwi[.]solutions/m02/
Shown above: Screenshot of the email.
EMAIL INFORMATION:
- Date: Friday, 2018-02-16 at 12:28 UTC
- Subject: Confirm 30% advance payment
- From: "Justin" <justin@yahoo[.]com>
- Received: from 139.162.5.147 ([139.162.5[.]147])
- Message-ID: <E1emf7M-0000Xa-Sm@kccgroups.dnsracks[.]com>
- Attachment name: Transfer Copy.zip
Shown above: Extracting the malware from the zip attachment and running it.
TRAFFIC
Shown above: Traffic from the infection filtered in Wireshark.
INFECTION TRAFFIC:
- 199.188.206[.]251 port 80 - www.hemalipaterl[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0
- 202.254.234[.]147 port 80 - www.kinketsukun[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 202.254.234[.]147 port 80 - www.kinketsukun[.]com - POST /m02/
- 34.232.43[.]118 port 80 - www.deliciousvillefoods[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 34.232.43[.]118 port 80 - www.deliciousvillefoods[.]com - POST /m02/
- 193.33.128[.]202 port 80 - www.siwi[.]solutions - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 193.33.128[.]202 port 80 - www.siwi[.]solutions - POST /m02/
- 5.178.76[.]18 port 80 - www.discovertellus[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 5.178.76[.]18 port 80 - www.discovertellus[.]com - POST /m02/
- 77.223.137[.]20 port 80 - www.karselasansor[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 77.223.137[.]20 port 80 - www.karselasansor[.]com - POST /m02/
- 104.203.229[.]215 port 80 - www.885mt[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 104.203.229[.]215 port 80 - www.885mt[.]com - POST /m02/
- 192.163.183[.]245 port 80 - www.jueduizan[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 192.163.183[.]245 port 80 - www.jueduizan[.]com - POST /m02/
- 72.52.4[.]122 port 80 - www.clevelandtaxaccountant[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 72.52.4[.]122 port 80 - www.clevelandtaxaccountant[.]com - POST /m02/
- 208.91.197[.]91 port 80 - www.navstyle[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 208.91.197[.]91 port 80 - www.navstyle[.]com - POST /m02/
- 23.83.192[.]177 port 80 - www.erfenbu[.]com - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
- 23.83.192[.]177 port 80 - www.erfenbu[.]com - POST /m02/
- 52.219.64[.]19 port 80 - www.blitzathletics[.]fitness - GET /m02/?LFN4x=[long string]==&wN688b=HZl0&sql=1
MALWARE
EMAIL ATTACHMENT (ZIP ARCHIVE):
- SHA256 hash: f5e2ec975eb815e3963ec266e8090ef8abbd89af3dde5b036f5fa2840484a436
File size: 277,181 bytes
File name: Transfer Copy.zip
EXTRACTED FORMBOOK MALWARE:
- SHA256 hash: 22d9e1cf5d47b9cccd1b1449037ec1017f1747805cd09300bbd0fdc7167b28a8
File size: 495,616 bytes
File name: Swift Document.exe
File location after infection: C:\Program Files (x86)\L0xep\winzv1lxh98.exe
Click here to return to the main page.