Fake 'Invoice', 'Penalty Charge Notice', 'Payment notification' SPAM, Facebook Phish
FYI...
Fake 'Invoice' SPAM - malicious attachment
-
http://blog.dynamoo.com/2016/01/malware-spam-invoice-205611-49934798.html
6 Jan 2016 - "This -fake- financial spam has
a malicious attachment. The sender's names, reference numbers and attachment names vary. Here is one example:
From: Bertha Sherman
Date: 6 January 2016 at 09:29
Subject: Invoice-205611-49934798-CROSSHILL SF
Dear Customer,
Please find attached Invoice 02276770 for your attention.
Should you have any Invoice related queries please do not hesitate to
contact either your designated Credit Controller or the Main Credit Dept. on
01635 279370.
For Pricing or other general enquiries please contact your local Sales Team.
Yours Faithfully,
Credit Dept' ...
I have seen at least -four- different attachments with names in a format similar to invoice40201976
.doc... Malwr reports... show that the malware contained within POSTs to:
37.46.130.53 /jasmin/authentication.php
179.60.144.21 /jasmin/authentication.php
195.191.25.138 /jasmin/authentication.php
Those reports also show communication to other suspect IPs, giving:
94.158.214.45 (Noviton Ltd , Russia)
78.47.119.93 (Hetzner, Germany)
2.61.168.116 (Sibirtelecom, Russia)
37.46.130.53 (JSC Server, Russia)
179.60.144.21 (Veraton Projects Ltd, Netherlands)
195.191.25.138 (Hostpro Ltd, Ukraine)
This Hybrid Analysis* also shows similar characteristics. The macro drops a file tsx3
.exe with a detection rate of 7/55**. The Malwr report*** doesn't give any particular insight as to what this is, but it is likely to be
a banking trojan or ransomware. There are two other similar spam campaigns at the same time [1] [2], one of which POSTs to a McHost .RU IP in Russia:
109.234.34.224 /jasmin/authentication.php ...
Recommended blocklist:
94.158.214.45
78.47.119.93
2.61.168.116
37.46.130.53
179.60.144.21
195.191.25.138
109.234.34.224 "
*
https://www.hybrid-analysis.com/sam...297f192d2f57e34a8107f1aea5300?environmentId=2
**
https://www.virustotal.com/en/file/...0c818dcfb77261e14d8de933/analysis/1452075219/
***
https://malwr.com/analysis/MmFjNGZjZjllOWVlNDFlNTlhYzcxNDlkMmRhMmZjZWY/
1]
http://blog.dynamoo.com/2016/01/malware-spam-invoice-for-ia20114520.html
2]
http://blog.dynamoo.com/2016/01/malware-spam-payment-notification-from.html
-
http://myonlinesecurity.co.uk/invoi...sf-word-doc-or-excel-xls-spreadsheet-malware/
6 Jan 2016 - "An email with the subject of 'Invoice-205611-88038421-CROSSHILL SF' coming from random email addresses and senders with
a malicious word doc or Excel XLS spreadsheet attachment is another one from the
current bot runs...
6 January 2016: invoice88038421
.doc - Current Virus total detections 2/56*
MALWR** shows tsx3
.exe downloaded from http ://
37.46.130.53/jasmin/authentication.php (VirusTotal 6/56***)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents either appear to be totally blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013, 2016 and 365:
>
http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...6673563c0ecff0b083e8b284/analysis/1452072516/
**
https://malwr.com/analysis/YTI1YTcwNjdmZjExNDM5YTk0YzNkZDI1YzExMWZjNGY/
***
https://www.virustotal.com/en/file/...0c818dcfb77261e14d8de933/analysis/1452073223/
___
Fake 'Penalty Charge Notice' SPAM - malicious attachment
-
http://blog.dynamoo.com/2016/01/malware-spam-invoice-for-ia20114520.html
6 Jan 2016 - "This -fake- financial spam comes with
a malicious attachment. The sender's name, reference numbers and attachment names vary. It seems to be closely related to this spam run*.
From: Viola Carrillo
Date: 6 January 2016 at 09:53
Subject: Invoice for IA20114520
To Whom It May Concern,
Please find attached an invoice relating to Penalty Charge Notice Number IA20114520 along with a copy of the contravention.
In order to prevent this fine from escalating further we have paid this fine on your behalf. Should you have any queries concerning these charges please don’t hesitate to contact me.
Payment for this invoice will be taken by Direct Debit 9 working days from the date of this email.
Please refer to page 2, point 3.6 in your Terms and Conditions for information on Traffic Offences.
I have seen two variants of the attachment (VirusTotal results [1] [2]) and these two Malwr reports [3] [4] indicate identical characteristics to the payload in this spam run* which is also being sent out today."
*
http://blog.dynamoo.com/2016/01/malware-spam-invoice-205611-49934798.html
1]
https://www.virustotal.com/en/file/...078e38ffefe3e959d92edc70/analysis/1452076482/
2]
https://www.virustotal.com/en/file/...df47a048ce8f1609d56e1174/analysis/1452076495/
3]
https://malwr.com/analysis/NTIyNzhmYmUxOWQyNDY0MTlmZWNiZDFhMGY0OWUxNGQ/
195.191.25.138
78.47.119.93
13.107.4.50
4]
https://malwr.com/analysis/YWZjODliMmRkYjVjNGFhZDkzM2FmOGNmMDYwMzNlNWQ/
195.191.25.138
78.47.119.93
13.107.4.50
-
http://myonlinesecurity.co.uk/invoice-for-ia20122439-word-doc-or-excel-xls-spreadsheet-malware/
6 Jan 2016 - "The second of today’s Dridex downloaders... pretends to be a penalty-charge-notification is an email with the subject of 'Invoice for IA20122439' (random numbers) pretending to come from random senders with
a malicious word doc or Excel XLS spreadsheet attachment is another one from the
current bot runs...
6 January 2016 : invoice20122439
.doc - Current Virus total detections 2/56*
MALWR** shows us a download of tsx3
.exe from http ://
109.234.34.224/jasmin/authentication.php
... this is the -same- Dridex payload as described in today’s slightly earlier Malspam run***..."
*
https://www.virustotal.com/en/file/...3a2605ab25f002343690ff27/analysis/1452076028/
**
https://malwr.com/analysis/MWFhNTVjZGI2NTI0NDUwMWFjZjVkYzhmNjFkY2JjZjc/
109.234.34.224
78.47.119.93
13.107.4.50
***
http://myonlinesecurity.co.uk/invoi...sf-word-doc-or-excel-xls-spreadsheet-malware/
___
Fake 'Payment notification' SPAM - doc/xls malware
-
http://myonlinesecurity.co.uk/payme...ed-word-doc-or-excel-xls-spreadsheet-malware/
6 Jan 2016 - "The Third of today’s Dridex downloaders... pretends to be an energy statement is an email with the subject of 'Payment notification from Third Energy Services Limited' coming from random senders and random email addresses with
a malicious word doc or Excel XLS spreadsheet attachment is another one from the
current bot runs... The email looks like:
From: Blair Maldonado <MaldonadoBlair76939@ ewb-mn .org>
Date: Wed 06/01/2016 10:29
Subject: Payment notification from Third Energy Services Limited
Body content:
Payment notification from Third Energy Services Limited
Third Energy Services Limited
Registered in England & Wales. Registered number: 50380220.
Registered office: 7th Floor. Portland House, Bressenden Place, London, UK, SW1E 5BH
Tel: 01944 759904 ot 0207 0420 800
This email and any attachments to it may be confidential and are intended solely for the use of the individual to whom it is addressed. Any views or opinions expressed are solely those of the author and do not necessarily represent those of Third Energy. If you are not the intended recipient of this email, you must neither take any action based upon its contents, nor copy or show it to anyone...
6 January 2016: remit50380220
.doc - Current Virus total detections 2/55*
MALWR** once again shows a download of tsx3
.exe from http ://
195.191.25.138/jasmin/authentication.php which is the -same-
Dridex banking malware as described in today’s earlier malspam runs [1] [2]..."
*
https://www.virustotal.com/en/file/...4f21972b81db63778a5f2c49/analysis/1452076128/
**
https://malwr.com/analysis/ZmUwNWIzMjk5NDg0NDlkNDgzMGMyZWY0NWM2YmMxMjM/
195.191.25.138
94.158.214.45
78.47.119.93
13.107.4.50
2.61.168.116
1]
http://myonlinesecurity.co.uk/invoice-for-ia20122439-word-doc-or-excel-xls-spreadsheet-malware/
2]
http://myonlinesecurity.co.uk/invoi...sf-word-doc-or-excel-xls-spreadsheet-malware/
-
http://blog.dynamoo.com/2016/01/malware-spam-payment-notification-from.html
6 Jan 2016 - "This -fake- financial email comes with
a malicious attachment.
From: Addie Caldwell
Date: 6 January 2016 at 10:31
Subject: Payment notification from Third Energy Services Limited
Payment notification from Third Energy Services Limited...
... -three- different versions of the attachment (in the format remit85752524
.doc or similar)... similar characteristics to this spam run* plus this additional URL:
109.234.34.224 /jasmin/authentication.php
This IP is allocated to McHost .RU in Russia and can be considered as
malicious. The payload is unknown, but is possible Dridex.
Recommended blocklist:
94.158.214.45
78.47.119.93
2.61.168.116
37.46.130.53
179.60.144.21
195.191.25.138
109.234.34.224 "
*
http://blog.dynamoo.com/2016/01/malware-spam-invoice-205611-49934798.html
___
Fake 'BACS PAYMENT' SPAM - malicious attachment
-
http://blog.dynamoo.com/2016/01/malware-spam-sta19778072-bacs-payment.html
6 Jan 2016 - "This -fake- financial spam comes with different sender names, reference details and attachment names. However, in all cases
the attachment is malicious.
From: Forrest Cleveland
Date: 6 January 2016 at 11:23
Subject: STA19778072 - BACS PAYMENT
Importance: High
Hello,
Wasn’t sure who to email.
I don’t know if you have been asked but Statestrong Products Ltd are making one payment today for two cars. Could you let me know when it is in the account please as these are both collections tomorrow...
So far I have seen -three- different attachment variants... same general characteristics as this spam run*. However in this case the dropped file tsx3
.exe has been updated and the -new- version has a detection rate of 6/54**. The Malwr report*** indicates very similar traffic to before.
Recommended blocklist:
94.158.214.45
78.47.119.93
2.61.168.116
37.46.130.53
179.60.144.21
195.191.25.138
109.234.34.224 "
*
http://blog.dynamoo.com/2016/01/malware-spam-invoice-205611-49934798.html
**
https://www.virustotal.com/en/file/...2dffa979018dbddb29356e9d/analysis/1452080581/
***
https://malwr.com/analysis/NjUyZjQ4YTUyMjc4NDkyNzkzY2E2N2I1NjIxYjcyNTc/
78.47.119.93
165.254.102.181
-
http://myonlinesecurity.co.uk/sta37626091-bacs-payment-word-doc-or-excel-xls-spreadsheet-malware/
6 Jan 2016 - "The 4th of today’s Dridex malspam downloaders... email with the subject of 'STA37626091 – BACS PAYMENT' (random numbers) coming from random email addresses and senders with
a malicious word doc or Excel XLS spreadsheet attachment is another one from the
current bot runs...
Screenshot:
http://myonlinesecurity.co.uk/wp-content/uploads/2016/01/STA37626091-BACS-PAYMENT-1024x535.png
6 January 2016: remit37626091
.doc - Current Virus total detections *
MALWR** shows us it once again downloads tsx3
.exe which looks like
Dridex banking malware from http ://
37.46.130.53/jasmin/authentication.php (VirusTotal ***) this looks like an updated version from earlier, but Dridex is known to update at frequent intervals throughout the day, often as frequently as -hourly- ..."
*
https://www.virustotal.com/en/file/...e3ad43c0d9c62de20549f1b6/analysis/1452079135/
**
https://malwr.com/analysis/MjEyZjhkOWI0YzlhNGZjNjg3YzgyMTY2NzAzODk3NTA/
37.46.130.53
78.47.119.93
13.107.4.50
***
https://www.virustotal.com/en/file/...2dffa979018dbddb29356e9d/analysis/1452078831/
___
Fake 'Unilet Invoice' SPAM - malicious attachment
-
http://blog.dynamoo.com/2016/01/malware-spam-unilet-invoice-67940597.html
6 Jan 2016 - "This fake invoice seems to be a bit confused as to who is sending it. It has
a malicious attachment.
From: Desiree Doyle
Date: 6 January 2016 at 12:29
Subject: Unilet Invoice 67940597
Hello,
Please find attached another invoice to pay please by BACS.
Thanks
Desiree Doyle
Accounts Department
-----Original Message-----
From: Desiree Doyle
Sent: 06 January 2016 12:30
To: Desiree Doyle
Subject: Scanned from a Xerox Multifunction Device
Please open the attached document. It was scanned and sent to you using a Xerox Multifunction Device.
Attachment File Type: pdf, Multi-Page
Multifunction Device Location: Melbury House-MG01
Device Name: 7225 ...
The attachment has a random name in the format remit41071396
.doc and I have seen -three- different versions with quite low detection rates [1] [2] [3]. The Malwr reports for these [4] [5] [6] indicate that it has the -same- behaviour as the spam documented here*, dropping a file tsx
.exe ..."
1]
https://www.virustotal.com/en/file/...8907dc1fccb1fdc28fc1cef4/analysis/1452084584/
2]
https://www.virustotal.com/en/file/...982ff604ff75bd3b97cbcb0b/analysis/1452084616/
3]
https://www.virustotal.com/en/file/...2f453642a183792d09db299e/analysis/1452084631/
4]
https://malwr.com/analysis/Yjk3ZWRhYTEyZjU3NDQ2ZmJhMmMwZWQ3NWI1ZDQ5MGQ/
37.46.130.53
2.61.168.116
78.47.119.93
13.107.4.50
94.158.214.45
5]
https://malwr.com/analysis/NmZmMTM2MzE5NTQ2NGExNGEyN2U1ZTU4YTNhNzVmNjY/
179.60.144.21
6]
https://malwr.com/analysis/YjE1NzljMWJhOWYzNGVlYTk4NzBmM2EwNGE4NzQxZDU/
37.46.130.53
78.47.119.93
13.107.4.50
*
http://blog.dynamoo.com/2016/01/malware-spam-invoice-205611-49934798.html
-
http://myonlinesecurity.co.uk/unile...vice-bournemouth-university-word-doc-malware/
6 Jan 2016 - "Yet another Dridex downloader coming in an email with the subject of 'Unilet Invoice 58520927' (random numbers) pretending to come from random senders and random email addresses with
a malicious word doc or Excel XLS spreadsheet attachment is another one from the
current bot runs...
Screenshot:
http://myonlinesecurity.co.uk/wp-content/uploads/2016/01/Unilet-Invoice-58520927-1024x518.png
6 January 2016: remit58520927
.doc - Current Virus total detections 2/56*
MALWR** once again shows us tsx3
.exe being downloaded from http ://
37.46.130.53/jasmin/authentication.php (VirusTotal 6/54***) -Same- Dridex Banking malware as THIS earlier malspam[4]..."
*
https://www.virustotal.com/en/file/...733b2faa279eaddc4f576079/analysis/1452083864/
**
https://malwr.com/analysis/NTM3Yzg2MmQzNDgwNDljZmI3OGE5M2JjYjk5ODBlNGI/
37.46.130.53
78.47.119.93
13.107.4.50
***
https://www.virustotal.com/en/file/...2dffa979018dbddb29356e9d/analysis/1452083988/
4]
http://myonlinesecurity.co.uk/sta37626091-bacs-payment-word-doc-or-excel-xls-spreadsheet-malware/
___
Facebook “Page Disabled” Phish - wants your Card Details
-
https://blog.malwarebytes.org/fraud...-page-disabled-phish-wants-your-card-details/
Jan 6, 2015 - "Fake Facebook Security pages are quite a common sight, and there’s a “Your page will be disabled unless…”
-scam- in circulation at the moment on random Facebook comment sections which you should steer clear of. The
scam begins with a message like this:
Warning!!!
Your page will be disabled.
Due to your page has been reported by other users.
Please re-confirm your page in order to avoid blocking. You violate our terms of service. If you are the original owner of this account, please re-confirm your account in order to avoid blocking.
If the multiple exclamation marks and generally terrible grammar didn’t give the game away, the following request certainly might:
To complete your pages account please confirm Http below:
https(dot)lnkd(dot)in/bNF9BUY?Facebook.Recovery.page
"Attention"
If you do not confirm, then our system will automatically block your account and you will not be able to use it again.
Thank you for the cooperation helping us improve our service.
The Facebook Team
... Google Safe Browsing flags the final destination as a dubious website: and fires up a “Deceptive site ahead” warning:
>
https://blog.malwarebytes.org/wp-content/uploads/2016/01/fakefacebook1.jpg
... After
harvesting your Facebook credentials, they then go after payment information:
>
https://blog.malwarebytes.org/wp-content/uploads/2016/01/fakefacebook3.jpg
... Should the victim enter their information and hit the button, they’ll be forwarded on to the real Facebook Security Facebook page. There’s also a “Confirm Paypal” button which leads to a
phish for -that- service, too:
>
https://blog.malwarebytes.org/wp-content/uploads/2016/01/fakefacebook4.jpg
The above page is located at:
report-fanpage(dot)gzpot(dot)com/Next/paypal(dot)com(dot)htm
Make no mistake, this is one
phishing scam that could cost you a lot more than your Facebook login. Should you be sent any attempts at panicking you into entering your logins on a so-called “Security Page”, you should give both destination URL and comment sender a very wide berth."
>
https://www.virustotal.com/en/url/f...34952e4acde35a27d2d40547f795ba7d6a8/analysis/
report-fanpage.gzpot .com:
31.170.166.81:
https://www.virustotal.com/en/ip-address/31.170.166.81/information/
>
https://www.virustotal.com/en/url/a...0ffc025cef3e600002a2642ac79554796a9/analysis/
:fear::fear:
