mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

589
comptes actifs

#FormBook

0 message0 participant0 message aujourd’hui
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>2025-02-26 (Wednesday): <a href="https://kolektiva.social/tags/XLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XLoader</span></a> (<a href="https://kolektiva.social/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>) distributed through <a href="https://kolektiva.social/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a>. The email has an attached PDF document. The PDF has links for a ZIP download, and the ZIP contains files that use DLL side-loading for XLoader.</p><p><a href="https://bit.ly/4bgKRU8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4bgKRU8</span><span class="invisible"></span></a></p>

Found this user on the @internetarchive hosting images with embedded base64 encoded #malware between <<BASE64_START>> and <<BASE64_END>> flags. The malware is used to download an inject the next stage payload into another process. The campaign I observed involved #RemcosRAT

User page: archive.org/details/@nodetecto
Remcos: hxxps://petshopsirena[.]mk/a.txt
#c2 : 45.95.169[.]135:2404

I found samples dropping others such as #agenttesla and #formbook as well.

archive.orgInternet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine

30 Days of #Formbook: Day 4, Thursday 2023-06-08 "T30K" at malware-traffic-analysis.net/2

I can now confirm that Formbook steals login credentials from the Firefox web browser.

For browsers, it's Chrome, Firefox, and IE. But Formbook still does not steal from the current Chromium-based Microsoft Edge.

Here's a new advertising slogan for Edge: "Microsoft Edge: At least Formbook doesn't steal from it!"

You're welcome, Microsoft.

30 Days of #Formbook: Day 3, Wednesday 2023-06-07 "AE30" at malware-traffic-analysis.net/2

3 of 30 days? I'm 10% done!

My findings so far:

It seems like Formbook doesn't steal login credentials from the current Chromium-based Microsoft Edge or Thunderbird.

But it -does- steal credentials from Google Chrome & Outlook.

It still seems to still look for login credentials in Internet Explorer.

I'm basing this on artifacts from the directory that Formbook temporarily stores the screenshot of the desktop and any login credentials it steals. After it sends the info to the C2 server, Formbook deletes the files.

Today, I had Chrome installed and set up with some stored login credentials. I normally just use the current Chromium-based Edge for that, which was also present, but all those juicy login/password combos seem untouched by Formbook.

Nothing from Filezilla, either, in this case.

In this post, I've included a screenshot of my victim desktop that Formbook sent to its C2 server(s).

I'll keep mixing things up and trying other applications to see if there's anything else Formbook tries to steal from.

I mean, I know that Formbook is a sort of "bargain basement" MaaS-style malware, but come on! Not stealing from the current Microsoft Edge? I think Formbook's still stuck in the Windows 7 era.

30 Days of #Formbook: Day 1, Monday 2023-06-05

I'm generating #pcap files/IOCs from up-to-date Formbook samples I find on VirusTotal.

It'll take longer than 30 calendar days, I'm sure, but I plan on doing 30 of these.

We'll see if the accumulated data is worth anything. At least, there will be 30 examples of Formbook infections where people can see the data exfiltration, even if you can't decode it (which I can't yet).

My first post: malware-traffic-analysis.net/2

L’infostealer FormBook viene diffuso attraverso le campagna di ADS di Google

I #ricercatori di sicurezza #informatica di SentinelLabs riferiscono che una #campagna in corso utilizza gli annunci #Google per distribuire programmi di installazione di #malware che utilizzano la #tecnologia di virtualizzazione #KoiVM per evitare il rilevamento quando viene installato l’infostealer #FormBook.

KoiVM è un plugin per la protezione #ConfuserEx che offusca i codici operativi di un programma in modo che solo la macchina virtuale li capisca.

#redhotcyber #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity

redhotcyber.com/post/linfostea