Results 1 to 10 of 1320

Thread: SPAM frauds, fakes, and other MALWARE deliveries...

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #34
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'E-Ticket', 'invoice', 'Admin Exchange' SPAM

    FYI...

    Fake 'E-Ticket' SPAM – javascript malware
    - http://myonlinesecurity.co.uk/e-tick...cript-malware/
    21 Apr 2015 - "'E-Ticket 7694892' pretending to come from E-Ticket <online@ ticket .com> with a link to a zip attachment is another one from the current bot runs... The email looks like:

    This is your e-ticket receipt.
    SEAT / 30A/ZONE 3
    DATE / TIME 7 MAY, 2014, 09:19 AM
    ARRIVING / Tulsa
    ST / OK
    REF / KE.7818 BAG / 4PC
    TOTAL PRICE / 438.16 USD
    FORM OF PAYMENT / CC
    Download E-Ticket 7694892
    Yours sincerely,
    American Airlines E-Ticket services.


    21 April 2015: E-Ticket 7694892.zip: Extracts to: E-Ticket 7694892.js
    Current Virus total detections: 9/57* ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/e...is/1429584330/
    ___

    Fake 'invoice' SPAM - malicious doc attachment
    - http://blog.dynamoo.com/2015/04/malw...e-i413136.html
    21 Apr 2015 - "This spam email does not come from LA Grinding but is instead a simple forgery with a malicious attachment.
    From: Lichelle Ebner [mailto:Lichelle5938@ lagrinding .co .uk]
    Sent: Tuesday, April 21, 2015 9:55 AM
    Subject: LAG invoice I413136
    Dear Accounts Payable,
    Attached is a copy of invoice I413136 .The items were shipped. Please feel free to contact me if you have any questions or cannot read the attachment.
    Thank you for your business.
    Sincerely,
    Lichelle Ebner
    L. A. Grinding Company
    Ph. (818) 846-9134
    FAX (818)846-1786


    So far I have seen just a single sample with an attachment I413136.doc which has a VirusTotal detection rate of 2/57* and which contains this malicious macro... in turn this downloads a component from:
    http ://eternitymobiles .com/25/144.exe
    ..although there are probably different versions of the macro with different download locations, the binary itself should be the same in all cases. This is saved as %TEMP%\pierre6.exe and it has a detection rate of 5/56**. Automated analysis tools... show that it attempts to communicate with a familiar IP:
    89.28.83.228 (StarNet SLR, Moldova)
    According to this Malwr report it also drops a malicious Dridex DLL with a detection rate of 3/56***.
    Recommended blocklist:
    89.28.83.228 ..."
    * https://www.virustotal.com/en/file/d...is/1429609465/

    ** https://www.virustotal.com/en/file/8...is/1429609471/

    *** https://www.virustotal.com/en/file/b...is/1429610872/
    ___

    Fake 'Admin Exchange' SPAM – PDF malware
    - http://myonlinesecurity.co.uk/admini...e-pdf-malware/
    21 Apr 2015 - "'Administrator – Exchange Email id3405629' pretending to come from Administrator@ no-reply <Administrator@ your domain > with a zip attachment is another one from the current bot runs... The email looks like:

    no-reply,
    This attachment provides you with managing facilities for your mailboxes, public folders, distribution lists, contact and mail service general settings. Please save the attached file to your hard drive before deleting this message.
    To open the attachment (Exchange_id3405629.zip) please use the following password: Ujh6JZ2mHN
    Thank you,
    Administrator


    Note: the address it pretends to come from will be your own email domain and the link in the email will appear to be your own web site or domain.
    21 April 2015: Exchange_id3405629.zip: Extracts to: Exchange.exe
    Current Virus total detections: 1/54* NOTE: we are also seeing the same malware payload coming in as a -fake- fax, and with the subject of Internal ONLY . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/7...is/1429610427/
    ... Behavioural information
    UDP communications
    23.102.23.44: https://www.virustotal.com/en/ip-add...4/information/

    - http://threattrack.tumblr.com/post/1...nistrator-spam
    Apr 21, 2015
    Tagged: Exchange, Dyreza
    ___

    Fake 'new my info' SPAM – PDF malware
    - http://myonlinesecurity.co.uk/new-my...e-pdf-malware/
    21 Apr 2015 - "'new my info' pretending to come from random names and email addresses with a zip attachment that is named after the alleged sender is another one from the current bot runs... The email looks like:

    Hello! I have found some interesting information that you might need!
    Check out the attached file!
    Bicicletes Nadal Oliver, S.L.
    Passeig Ferrocarril, 61
    07500 Manacor (Mallorca)
    Illes Balears
    Tel.971-843358 ...


    21 April 2015: warehouseop02.zip: Extracts to: Alla.exe
    Current Virus total detections: 3/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/0...is/1429618876/
    ___

    Dridex re-directing to Malicious Dropbox hosted file via Google
    - https://isc.sans.edu/diary.html?storyid=19609
    2015-04-21 - "... this malware may use Google Analytics to count how many people opened the file, but I haven't confirmed that. Google -redirects- are however used to obscure the destination... Google will show a note that the user was redirected, but the file will download right away. It will not open, and the user will have to open it to enable the Macro to execute (DON'T)... Word document... example I received:
    > https://isc.sans.edu/diaryimages/ima...26_43%20AM.png
    ... Virustotal only shows 4 "hits" out of 57* AV tools tested for this binary:
    (More detail at the ISC URL above.)
    * https://www.virustotal.com/en/file/e...is/1429631351/
    File name: ACH transaction0336.doc

    Last edited by AplusWebMaster; 2015-04-21 at 23:19.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •