30 DAYS OF FORMBOOK: DAY 26, FRIDAY 2023-06-30 - "S28Y"

NOTICE:

NOTES:

 

ASSOCIATED FILES:

 

30 DAYS OF FORMBOOK: DAY 26, FRIDAY 2023-06-30 - "S28Y"

INFECTION CHAIN:

- Email --> attached zip archive --> extracted Formbook EXE --> victim runs Formbook EXE

MALWARE/ARTIFACTS:

- SHA256 hash: 36c59fca2be8a3be742cfa48db7112d01fc18ec1eb855e46f44a014de1726607
- File size: 231,008 bytes
- File name: PRE ALERT NOTICE#202307.zipsh
- File type: Zip archive data, at least v2.0 to extract, compression method=deflate
- File description: Zip archive containing Formbook EXE

- SHA256 hash: 215bf08032eb73c5e0b50bcce07def909e22f769315b0f90ed6cec87b28d44f6
- File size: 245,825 bytes
- File name: PRE ALERT NOTICE#202307.exe
- Persistent file location #1: C:\Users\[username]\AppData\Roaming\gluqaj\fokscx.exe
- Persistent file location #2:  C:\Program Files (x86)\Bzzyxv\gdiplptor.exe
- File type:  PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
- File description: Windows EXE for Formbook version 4.1

PERSISTENCE:

- Windows Registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Value 0 name: hqmvrbk
- Value 0 type: REG_SZ
- Value 0 Data: C:\Users\[username]\AppData\Roaming\gluqaj\fokscx.exe "C:\Users\[username]\Downloads\
                PRE ALERT NOTICE#202307.exe"
- Value 1 name: NJNXQZG8VV
- Value 1 type: REG_SZ
- Value 1 Data: C:\Program Files (x86)\Bzzyxv\gdiplptor.exe

DATA STORED FOR EXFILTRATION TO FORMBOOK C2 SERVER:

- C:\Users\[username]\AppData\Roaming\6L80511C\6L8log.ini - 0 bytes
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logim.jpeg  (screenshot of desktop)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrc.ini  (Outlook Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrf.ini  (Firefox Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrg.ini  (Chrome Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logri.ini  (Iexplore Recovery)
- C:\Users\[username]\AppData\Roaming\6L80511C\6L8logrv.ini  (__Vault Recovery)

- Note: All the above files were deleted after data exfiltation, except for first file at 0 bytes.

FORMBOOK HTTP GET AND POST REQUESTS:

- GET /s28y/?[string of alphanumeric characters with the following mixed in: = _ + and /]
- POST /s28y/

DOMAINS THAT DID NOT RESOLVE:

- DNS query for www.campinglager[.]beer - no response from DNS server
- DNS query for www.probiostarter[.]com - no response from DNS server
- DNS query for www.rttty15[.]com - no response from DNS server
- DNS query for www.vg4d0o[.]work - no response from DNS server

- DNS query for www.2auw88[.]com - response: No such name
- DNS query for www.338zt7we6i0[.]cyou - response: No such name
- DNS query for www.babyhubstore[.]com - response: No such name
- DNS query for www.brekroic[.]com - response: No such name
- DNS query for www.copythriller[.]com - response: No such name
- DNS query for www.prinicaonlinr[.]com - response: No such name
- DNS query for www.rewindrehabilitation[.]com - response: No such name
- DNS query for www.sabzevarfaj[.]sbs - response: No such name
- DNS query for www.shisokj[.]vip - response: No such name
- DNS query for www.usrinfo[.]top - response: No such name
- DNS query for www.xn--i2bwwzn[.]com - response: No such name
- DNS query for www.yijgqpi59[.]top - response: No such name

DOMAINS THAT RESOLVED, BUT NO CONNECTION TO SERVER:

- port 80 - www.fascistian[.]com - TCP SYN segments only, no response or RST from server
- port 80 - www.hotelguerneville[.]com - TCP SYN segments only, no response or RST from server
- port 80 - www.jiangwan[.]top - TCP SYN segments only, no response or RST from server

DOMAINS USED FOR FORMBOOK GET REQUESTS:

- Note: These appear to be legitimate websites or parked domain pages. 

- www.1d8t[.]com
- www.86slsz[.]com
- www.airrests[.]com
- www.blahblahblahkatee[.]com
- www.blogdamuskinha[.]com
- www.coatedincoco[.]com
- www.contourbioinc[.]com
- www.farviolet[.]com
- www.gaynorvascones[.]site
- www.getwinchance[.]com
- www.hg301d[.]cfd
- www.investigatorsshow[.].net
- www.kedou25[.]com
- www.lightsoftwear[.]com
- www.m-behjati[.]com
- www.mpocash[.]mobi
- www.mvp688[.]pro
- www.nissanvideos[.]com
- www.ordukampanyalar[.]com
- www.prosblogs[.]com
- www.redbudvending[.]com
- www.relovedresses[.]com
- www.revolut[.]expert
- www.riverwoodschool[.]com
- www.sedashop[.]com
- www.serenitysuite[.]health
- www.starbytescafe[.]com
- www.tickeplate[.]com
- www.truyenfullonline[.]com
- www.visual138[.]info
- www.wexun[.]net
- www.whytry[.]shop
- www.wildcatcreekhomes[.]com
- www.youbi[.]cyou

DOMAINS USED FOR FORMBOOK GET AND POST REQUESTS:

- Note: These appear to be legitimate websites or parked domain pages. 

- www.8betkrw[.]com
- www.ccxx0[.]com  **
- www[.]comienzadesdecero[.]com
- www.configurableba[.]life
- www.hieblev[.]online  **
- www.i8ep58[.]cfd
- www.i9bet[.]quest  **
- www.litescales[.]sbs  **
- www.lyrianhealth[.]com
- www.newskysupplies[.]com  **
- www.ou3ejf[.]cfd
- www.readyconcreto[.]com  **

  ** - Full stolen data (encoded) sent through HTTP POST request.

 

Click here to return to the main page.