30 DAYS OF FORMBOOK: DAY 3, WEDNESDAY 2023-06-07 - "AE30"
NOTICE:
- Of note, the zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
NOTES:
- This the is 3rd of 30 infection runs on new Formbook samples during the next month or two.
- Today's sample is from a .rar archive submitted to VirusTotal early Wednesday 2023-06-07.
FINDINGS:
- Based on files temporarily stored in the data exfiltration directory, I found the following:
- Formbook steals login credentials from Chrome, but it doesn't appear to steal from the Chromium-based Microsoft Edge browser.
- Looks like Formbook still tries stealing from Internet Explorer brower. I haven't tried the pre-Chromium Edge yet.
- Formbook steals login credentials from Outlook, but it doesn't steal login credentials from the Thunderbird email client.
ASSOCIATED FILES:
- 2023-06-07-IOCs-for-Formbook-infection.txt.zip 2.4 kB (2,396 bytes)
- 2023-06-07-Formbook-infection.pcap.zip 8.3 MB (8,265,095 bytes)
- 2023-06-07-Formbook-malware-and-artifacts.zip 1.4 MB (1,410,962 bytes)
IMAGES

Shown above: Traffic from the infection filtered in Wireshark.
30 DAYS OF FORMBOOK: DAY 3, WEDNESDAY 2023-06-07 - "AE30"
INFECTION CHAIN:
- Unknown vector, possibly distributed as email attachment.
FORMBOOK SAMPLE:
- SHA256 hash: c68d075e0b6d611c385eb3d05f8f7d5c6cb0b6fc86950c95f58a5fe76f7f0b86
- File size: 695,869 bytes
- File name: Drawing-img-.r11
- File type: RAR archive data, v4, os: Win32
- File description: RAR archive containing Formbook EXE
- SHA256 hash: 61d71745d3564cb52992ff8c59ed73f9f2d5025da3e64f6c607c56ed2604f521
- File size: 793,088 bytes
- File name: Drawing-img-.exe
- Persistent file location: C:\Program Files (x86)\Tp4n\upxtu0vh.exe
- File type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
- File description: Formbook EXE
- Creation Time: 2023-06-07 03:26:33 UTC
FORMBOOK PERSISTENCE:
- Windows Registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Value name: GLHPQT0P
- Value type: REG_SZ
- Value Data: C:\Program Files (x86)\p4n\upxtu0vh.exe
DATA STORED FOR EXFILTRATION TO FORMBOOK C2 SERVER:
- C:\Users\[username]\AppData\Roaming\8-67R9DQ\8-6log.ini - 0 bytes
- C:\Users\[username]\AppData\Roaming\8-67R9DQ\8-6logim.jpeg - 277,178 bytes (screenshot of desktop)
- C:\Users\[username]\AppData\Roaming\8-67R9DQ\8-6logrc.ini - 1952 bytes (Outlook Recovery)
- C:\Users\[username]\AppData\Roaming\8-67R9DQ\8-6logrg.ini - 502 bytes (Chrome Recovery)
- C:\Users\[username]\AppData\Roaming\8-67R9DQ\8-6logri.ini - 40 bytes (Iexplore Recovery)
- C:\Users\[username]\AppData\Roaming\8-67R9DQ\8-6logrv.ini - 40 bytes (__Vault Recovery)
- Note: All the above files were deleted after data exfiltation, except for first file at 0 bytes named 8-6log.ini
FORMBOOK HTTP GET AND POST REQUESTS:
- GET /ae30/?[string of alphanumeric characters with the following mixed in: = _ + and /]
- POST /ae30/
DOMAINS THAT DID NOT RESOLVE:
- DNS query for www.christmaslv[.]com - no response from DNS server
- DNS query for www.gbera9ja[.]africa - no response from DNS server
- DNS query for www.thevelvetkit[.]africa - no response from DNS server
- DNS query for www.tutastrading[.]africa - no response from DNS server
- DNS query for www.zwelethugh[.]africa - no response from DNS server
- DNS query for www.broadbandterbaik[.]com - response: No such name
- DNS query for www.dxbsultan[.]com - response: No such name
- DNS query for www.flrfteb[.]ru - response: No such name
- DNS query for www.guideonwheels[.]com - response: No such name
- DNS query for www.howlsmovingcastlemerch[.]store - response: No such name
- DNS query for www.hulihuli[.]net - response: No such name
- DNS query for www.inhomeidea[.]com - response: No such name
- DNS query for www.k59963[.]com - response: No such name
- DNS query for www.kgaming[.]dev - response: No such name
- DNS query for www.lobosmc12[.]com - response: No such name
- DNS query for www.lowridericon[.]com - response: No such name
- DNS query for www.alphaestetica[.]com - resolved to 127.0.0.1
DOMAINS USED FOR FORMBOOK GET REQUESTS:
- Note: These appear to be legitimate websites or parked domain pages.
- 162.209.189[.]207 or 162.209.189[.]208 port 80 - www.4983517[.]com
- 160.251.73[.]39 port 80 - www.ailihuq[.]com
- 104.18.26[.]189 or 104.18.27[.]189 port 80 - www.asteramoving[.]com
- 162.0.215[.]179 port 80 - www.bakedcivilization[.]com
- 23.227.38[.]74 port 80 - www.bedicustomgraphicapparel[.]com
- 15.197.142[.]173 port 80 - www.board-advising[.]com
- 89.31.143[.]1 port 80 - www.diamondshouse-hannover[.]online
- 192.99.101[.]236 port 80 - www.dompacino[.]com
- 69.163.216[.]147 port 80 - www.electrosertecnologia[.]com
- 13.56.33[.]8 port 80 - www.ezengage[.]com
- 198.54.117[.]217 port 80 - www.fact-times[.]live
- 15.197.142[.]173 port 80 - www.greenarrow-advisors[.]com
- 141.136.39[.]20 port 80 - www.kurrent[.]store
- 173.213.6[.]203 port 80 - www.lajwbwcl[.]com
- 34.117.168[.]233 port 80 - www.landonwieweck[.]com
- 64.190.62[.]22 port 80 - www.landscapingideas[.]site
- 31.28.24[.]244 port 80 - www.lili116[.]ru
- 76.76.21[.]98 port 80 - www.reachphone[.]app
DOMAINS USED FOR FORMBOOK GET AND POST REQUESTS:
- Note: These appear to be legitimate websites or parked domain pages.
- 104.21.67[.]19 port 80 - www.accidentattorneysearch-jp[.]life
- 194.58.112[.]165 port 80 - www.apatitum[.]ru **
- 64.190.62[.]22 port 80 - www.dollarvalue-guide[.]site
- 176.9.105[.]210 port 80 - www.falconspice[.]com **
- 173.208.96[.]44 port 80 - www.fierceroar[.]uk
- 23.227.38[.]74 port 80 - www.frametasticuy[.]com **
- 156.242.168[.]252 port 80 - www.fshxzz[.]com **
- 15.197.142[.]173 port 80 - www.grandviewtub2shower[.]com
- 34.102.136[.]180 port 80 - www.jkdairyjammu[.]com
- 137.184.219[.]55 port 80 - www.kinder-vaccine[.]com **
- 47.252.27[.]61 port 80 - www.ladderlab[.]site
- 162.254.207[.]54 port 80 - www.lostdrivinglicence[.]co[.]uk !!
- 195.2.80[.]197 port 80 - www.rseriali[.]net
- 184.94.215[.]140 port 80 - www.xysklhgf[.]xyz **
** - Full stolen data (encoded) sent through HTTP POST request.
!! - www.lostdrivinglicence[.]co[.]uk has been used for Formbook since at least 2023-05-02. It had the last Formbook HTTP
POST request during this infection run, and response headers indicate this server may have accepted the stolen data.
A browser check on this domain returned a parked page hosted by Bodis, a domain parking platform.
Click here to return to the main page.
