{"id":7611,"date":"2022-03-31T10:16:56","date_gmt":"2022-03-31T17:16:56","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7611"},"modified":"2024-04-26T13:20:06","modified_gmt":"2024-04-26T20:20:06","slug":"cyber-threat-advisory-formbook-deploys-new-evasive-techniques","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/","title":{"rendered":"Cyber Threat Advisory: Formbook deploys new evasive techniques"},"content":{"rendered":"<h3><strong>Author: Ma\u00ebl Le Touz<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Executive summary<\/h3>\n<p>On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla &#8211; in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately the payload in this campaign was Formbook. The droppers use VM detection, steganography, process hollowing, mutexes, and many other evasion techniques, and they rely heavily on XOR encryption.<\/p>\n<h3>2. Analysis<\/h3>\n<h3>2.1 Customer impact<\/h3>\n<p>At first glance, the characteristics of the campaign match those of campaigns known to distribute Agent Tesla and Formbook. Both are information stealers and capable of identifying and exfiltrating passwords from browsers, email clients, cryptocurrency wallets, and many other software applications. Both are sold as malware-as-a-service on specialized hacking forums, and both allow buyers to customize the malware with their own command and control (C&amp;C) and obfuscation methods.<\/p>\n<h3>2.2 Campaign analysis<\/h3>\n<p>The spam lure is unsophisticated and has been used by threat actors consistently in recent years. All emails have the same subject line, \u201cRE: Payment Transfer slip\u201d, and a single attached file, Payment slip PDF.zip, which contains a PE32 executable called Payment Slip PDF.exe. Because the malware uses various anti-evasion and anti-detection techniques (described below), most antivirus solutions were unable to correctly identify the threat or to provide actionable intelligence.<\/p>\n<h3>2.3 Analysis of the first file<\/h3>\n<p>Payment slip PDF.exe is a heavily obfuscated .NET executable that targets Windows systems and is packed with ConfuserEX. The code is hardly readable, and the names of functions and variables in it are replaced with non-latin Unicode characters (the orange text in the screenshot below).<\/p>\n<p>Figure 1: Obfuscated code from Payment Slip PDF.exe<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7612\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/obfuscated-code-from-payment-slip.png\" alt=\"\" width=\"640\" height=\"364\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/obfuscated-code-from-payment-slip.png 640w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/obfuscated-code-from-payment-slip-300x171.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>However, some functions are explicit. For example, to determine whether it is running in a sandbox, the program checks whether a remote debugger is present and tries to write to arbitrary memory locations. If the program detects a debugger, it fails silently.<br \/>\nThe dropper also tries to prevent debugging. It does this by using flags [DebuggerHidden] and [EditorBrowsable(EditorBrowsableState.never)] to prevent an IDE from displaying code or functions and thus to hamper reverse engineering efforts. Most of the code is never executed but, instead, is taken from an open-source CPU-simulation program written in VB.NET.<sup>1<\/sup><br \/>\nHidden in the code is a large string and a bitmap image with high entropy:<\/p>\n<p>Figure 2: Part of the bitmap image containing the payload binary<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7613\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/part-of-the-bitmap-image-containing-the-payload-binary.png\" alt=\"\" width=\"652\" height=\"419\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/part-of-the-bitmap-image-containing-the-payload-binary.png 652w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/part-of-the-bitmap-image-containing-the-payload-binary-300x193.png 300w\" sizes=\"auto, (max-width: 652px) 100vw, 652px\" \/><\/p>\n<p>At runtime, the string is converted to a Base64 array and XOR decoded with another key. This creates a DLL, which is then reflectively loaded by Payment Slip PDF.exe.<\/p>\n<h3>2.4 DLL decryption routine<\/h3>\n<p>The DLL, named Bunifu.UI, is another .NET executable, and it is obfuscated with the help of ConfuserEX.<\/p>\n<p>Figure 3: Semi-obfuscated code from the DLL<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7614\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/semi-obfuscated-code-from-the-dll.png\" alt=\"\" width=\"672\" height=\"402\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/semi-obfuscated-code-from-the-dll.png 672w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/semi-obfuscated-code-from-the-dll-300x179.png 300w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>The sole purpose of Bunifu.UI is to decrypt an image by using a key passed as an argument. For each non-transparent pixel in an image, the function extracts the values of red, green, and blue and returns an array. This array is then XOR-decoded by using the parameter supplied when the DLL is invoked:<\/p>\n<p>Figure 4: Deobfuscated decryption routine<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7615\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deobfuscated-decryption-routine.png\" alt=\"\" width=\"596\" height=\"685\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deobfuscated-decryption-routine.png 596w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deobfuscated-decryption-routine-261x300.png 261w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/p>\n<p>This method of obfuscation is consistent with that of Agent Tesla.<sup>2<\/sup><\/p>\n<h3>2.5 Decrypted BMP<\/h3>\n<p>Hijacking the function calls enabled us to identify the decryption key of the bitmap: oRbU. Decrypting the bitmap revealed another file, MajorRevision. MajorRevision is a PE32 executable written in .NET and it, too, is obfuscated using ConfuserEX. MajorRevision contains a lot of unreachable code, which is probably copied from an open-source application that, in another attempt to prevent analysis, queries and runs SQLite databases in C#.<br \/>\nMajorRevision is another dropper used in this campaign. It collects information about the endpoint, verifies that the endpoint is running on a real machine, and then writes and executes the malware itself. To achieve this, MajorRevision verifies that the running system contains several strings related to virtualisation, sandboxing, and the name of the user, and that a real hard drive is present.<\/p>\n<p>Figure 5: An example of checks for malware evasion<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7616\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/an-example-of-checks-for-malware-evasion.png\" alt=\"\" width=\"672\" height=\"392\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/an-example-of-checks-for-malware-evasion.png 672w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/an-example-of-checks-for-malware-evasion-300x175.png 300w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>This behavior is consistent with that of common malware-as-a-service payloads, such as Agent Tesla.<br \/>\nIf none of these checks succeeds, the program creates mutexes and copies of itself. To achieve persistence on the system, the program creates scheduled tasks. Although the code contains a mention of HTTP requests, the program does not make them. In fact, after achieving persistence on the target system, it runs several decryption routines to decrypt one of its embedded resources: an encrypted byte array called oj8UsD7H. After examining the code, we were able to extract the XOR key, PbmCIdBuCnEz. Decrypting the embedded byte array produced the final payload.<\/p>\n<h3>2.6 Final payload: Formbook<\/h3>\n<p>The final payload is not a .NET application but a MASM-compiled PE32 executable composed entirely of a .text section.<\/p>\n<p>Figure 6: Identification of the payload; note the fake TimeDateStamp<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7617\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/identification-of-the-payload-note-the-fake-timedatestamp.png\" alt=\"\" width=\"672\" height=\"350\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/identification-of-the-payload-note-the-fake-timedatestamp.png 672w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/identification-of-the-payload-note-the-fake-timedatestamp-300x156.png 300w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>Although the rest of the delivery has been used by Agent Tesla payloads in the past, the final payload is Formbook. The executable is heavily obfuscated and contains large arrays of encrypted arrays decrypted only at runtime. The executable uses customer routines to evade debugging, and it runs most of its code on an internal virtual machine. As is typical of Formbook, the sample communicates with dozens of domains established as decoys, but only uses one true C&#038;C.<\/p>\n<h3>3. Prevention and mitigation<\/h3>\n<ul>\n<li>To prevent mobile machines from infecting others with a new variant, block known malicious URLs at the perimeter firewall and at the client firewall.<\/li>\n<li>Implement attachment filtering to reduce the likelihood of malicious content reaching a user\u2019s workstation,<\/li>\n<li>Convert attachments to another format; for example, convert Microsoft Office documents to PDF documents. This can be an effective method for neutralizing malicious content.<\/li>\n<li>Block password-protected files and archives, because email filters cannot decrypt and inspect their contents. Block any protected archive or otherwise encrypted attachments until they can be deemed safe.<\/li>\n<li>Sanitize attachments to remove potentially harmful or active content, such as macros in Microsoft Office files, JavaScript, and links to executable downloads.<\/li>\n<li>Be aware of all attachments\u2019 file types. Never open a file that could be a script (.vbs, .cmd, or .bat), an internet shortcut file, or a compression file. Threat actors use these techniques to evade detection methods that are based on file hashes and signatures. Threat actors also use these techniques to mask malicious files as a way of evading email service restrictions against file types used in attachments.<\/li>\n<li>Be familiar with appropriate Windows Startup entries, and check them regularly for unusual and potentially malicious applications that can start in Windows.<\/li>\n<li>Do not allow web browsers to save credentials or other sensitive information.<\/li>\n<\/ul>\n<h3><strong style=\"font-size: 18px;\">Endnotes<\/strong><\/h3>\n<ol>\n<li><a href=\"https:\/\/github.com\/Cheungo\/LittleCheungComputer\"><strong>https:\/\/github.com\/Cheungo\/LittleCheungComputer<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.com\/unit42-analyzing-various-layers-agentteslas-packing\/\"><strong>https:\/\/unit42.paloaltonetworks.com\/unit42-analyzing-various-layers-agentteslas-packing\/<\/strong><\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Ma\u00ebl Le Touz &nbsp; 1. Executive summary On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla &#8211; in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6721,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[658,657,360],"class_list":{"0":"post-7611","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-cyber-threat-advisory","9":"tag-cyber-threat-intelligence","10":"tag-dns-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Advisory: Formbook deploys new evasive techniques | Infoblox<\/title>\n<meta name=\"description\" content=\"On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla - in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately the payload in this campaign was Formbook.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: Formbook deploys new evasive techniques\" \/>\n<meta property=\"og:description\" content=\"On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla - in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately the payload in this campaign was Formbook.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-31T17:16:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-17.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: Formbook deploys new evasive techniques\",\"datePublished\":\"2022-03-31T17:16:56+00:00\",\"dateModified\":\"2024-04-26T20:20:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/\"},\"wordCount\":1128,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-17.jpg\",\"keywords\":[\"Cyber Threat Advisory\",\"Cyber Threat Intelligence\",\"DNS Security\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/\",\"name\":\"Cyber Threat Advisory: Formbook deploys new evasive techniques | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-17.jpg\",\"datePublished\":\"2022-03-31T17:16:56+00:00\",\"dateModified\":\"2024-04-26T20:20:06+00:00\",\"description\":\"On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla - in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately the payload in this campaign was Formbook.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-17.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-17.jpg\",\"width\":612,\"height\":339,\"caption\":\"close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Advisory: Formbook deploys new evasive techniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Advisory: Formbook deploys new evasive techniques | Infoblox","description":"On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla - in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately the payload in this campaign was Formbook.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: Formbook deploys new evasive techniques","og_description":"On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla - in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately the payload in this campaign was Formbook.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/","og_site_name":"Infoblox Blog","article_published_time":"2022-03-31T17:16:56+00:00","article_modified_time":"2024-04-26T20:20:06+00:00","og_image":[{"width":612,"height":339,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-17.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: Formbook deploys new evasive techniques","datePublished":"2022-03-31T17:16:56+00:00","dateModified":"2024-04-26T20:20:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/"},"wordCount":1128,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-17.jpg","keywords":["Cyber Threat Advisory","Cyber Threat Intelligence","DNS Security"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/","name":"Cyber Threat Advisory: Formbook deploys new evasive techniques | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-17.jpg","datePublished":"2022-03-31T17:16:56+00:00","dateModified":"2024-04-26T20:20:06+00:00","description":"On March 19, Infoblox observed a new spam campaign distributing Formbook infostealer malware through email attachments. Formbook is installed through two different droppers, which are usually associated with Agent Tesla - in fact, much of the delivery involves known tactics and techniques for Agent Tesla, but ultimately the payload in this campaign was Formbook.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-17.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-17.jpg","width":612,"height":339,"caption":"close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-formbook-deploys-new-evasive-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Advisory: Formbook deploys new evasive techniques"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7611"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7611\/revisions"}],"predecessor-version":[{"id":7622,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7611\/revisions\/7622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6721"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}