0850 800 1483
In this e-book, which is a document prepared for cyber security professionals, you can find all the details, from how to analyze Formbook, which steals credentials found in email and internet browser applications, to measures to be taken and solutions.
Able to target any random individual, Formbook is often distributed via spam emails or uploaded to injected websites.
Via the keylogger function, it displays everything the user writes on their computer, steals email and browser credentials, and takes screenshots.
Working by injecting it into a running process memory, Formbook runs as the targets of the injection, explorer.exe, and random regular files in the %WinDir%\System32 folder.
Prior actions, including packaging, concealment, and execution by a downloader, are performed to arrive at the FormBook, which is responsible for the actual spoofing behavior.
It details how to perform a technical analysis including Wise.dll analysis, Collins.dll analysis, behavioral analysis, Formbook malware analysis and C2 server examples.
Email campaigns, various virus infection mechanisms and PDFs, doc, RTF documents, exe, zip, rar etc. distributed using different file attachments.
Established in 2017 to provide consultancy, service and support services on information security, Infinitum IT carries out studies within the framework of cyber incident response services, secure code development/analysis, penetration tests, and blue/red teamwork.
Esentepe Mah. Buyukdere Cad. LOFT PLAZA Floor:4 Flat:86 Levent/Istanbul
Copyright © 2023 InfinitumIT– All Rights Reserved.
Esentepe Mah. Buyukdere Cad. LOFT PLAZA Floor:4 Flat:86 Levent/Istanbul
Copyright © 2023 InfinitumIT– All Rights Reserved.