30 DAYS OF FORMBOOK: DAY 10, WEDNESDAY 2023-06-14 - "J0C7"

NOTICE:

NOTES:

 

ASSOCIATED FILES:

 

IMAGES


Shown above:  Traffic from the infection filtered in Wireshark.

 

30 DAYS OF FORMBOOK: DAY 10, WEDNESDAY 2023-06-14 - "J0C7"

FORMBOOK SAMPLE:

- SHA256 hash: f9454d0787965826c1f6e031eb78495f153453fca4efea4ed993dceb61f2e3d8
- File size: 261,366 bytes
- File name: DHL Receipt276334511.exe
- Persistent file location: C:\Program Files (x86)\Ozr4lln\rzatlltg.exe
- File type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
- File description: Windows EXE for Formbook version 4.1

FORMBOOK PERSISTENCE:

- Windows Registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Value name: JVOPLXT01X0
- Value type: REG_SZ
- Value Data: C:\Program Files (x86)\Ozr4lln\rzatlltg.exe

DATA STORED FOR EXFILTRATION TO FORMBOOK C2 SERVER:

- C:\Users\[username]\AppData\Roaming\58-OPSSE\58-log.ini - 0 bytes
- C:\Users\[username]\AppData\Roaming\58-OPSSE\58-logim.jpeg  (screenshot of desktop)
- C:\Users\[username]\AppData\Roaming\58-OPSSE\58-logrc.ini  (Outlook Recovery)
- C:\Users\[username]\AppData\Roaming\58-OPSSE\58-logrf.ini  (Firefox Recovery)
- C:\Users\[username]\AppData\Roaming\58-OPSSE\58-logrg.ini  (Chrome Recovery)
- C:\Users\[username]\AppData\Roaming\58-OPSSE\58-logri.ini  (Iexplore Recovery)
- C:\Users\[username]\AppData\Roaming\58-OPSSE\58-logrv.ini  (__Vault Recovery)

- Note: All the above files were deleted after data exfiltation, except for first file at 0 bytes.

FORMBOOK HTTP GET AND POST REQUESTS:

- GET /j0c7/?[string of alphanumeric characters with the following mixed in: = _ + and /]
- POST /j0c7/

DOMAINS THAT DID NOT RESOLVE:

- DNS query for www.amadeusliu[.]xyz - no response from DNS server
- DNS query for www.jinchunxi[.]com - no response from DNS server
- DNS query for www.seacrawlers[.]com - no response from DNS server

- DNS query for www[.]combatsportsacademyus[.]com - response: No such name
- DNS query for www.futurebuilding[.]community - response: No such name
- DNS query for www.getbeelu[.]com - response: No such name
- DNS query for www.ios777cpf[.]top - response: No such name
- DNS query for www.segui276[.]pics - response: No such name
- DNS query for www.thebestfurnitureplace[.]com - response: No such name

- DNS query for www.lwdingyi[.]com - no IP returned from DNS server
- DNS query for www.agreels[.]com - resolved to 127.0.0.1

DOMAINS USED FOR FORMBOOK GET REQUESTS:

- Note: These appear to be legitimate websites or parked domain pages. 

- www.00869[.]live
- www.534atjewish[.]store
- www.altyazi-hub[.]xyz
- www.biopale[.]com
- www.client23-portal[.]com
- www.flyersfirst[.]com
- www.g6mnt[.]xyz
- www.highsiddle[.]com
- www.lsty[.]net
- www.pb22362[.]com
- www.quotesonvideo[.]site
- www.riz-moj[.]com
- www.sinyalbuton[.]net
- www.xn--68j011g8slt1hlv3c[.]site

DOMAINS USED FOR FORMBOOK GET AND POST REQUESTS:

- Note: These appear to be legitimate websites or parked domain pages. 

- www.devrijeweide.store  **
- www.fbkjacn69[.]pics
- www.flaxtest[.]com  **
- www.lbvasd[.]xyz  **
- www.letsbet[.]life
- www.maestris-prepa[.]com  **
- www.manaroo[.]com
- www.mostafa-mahmoud[.]club  **
- www.prospectstrata[.]com  **
- www.restinpeace[.]website
- www.riz-moj[.]com
- www.starseedalignment[.]com  **
- www.tyec[.]xyz
- www.ythqq[.]com

  ** - Full stolen data (encoded) sent through HTTP POST request.

 

Click here to return to the main page.