Employee Documents - Internal Use
Headers:
Date: Wed, 21 Jan 2015 12:39:24 +0000
From: "invoice" {no-replay@invoice.com}
Subject: Employee Documents - Internal Use | |
Message body:
DOCUMENT NOTIFICATION, Powered by NetDocuments
DOCUMENT NAME: Employee Documents
DOCUMENT LINK: http://www.avralab.com/CUSTOMER-DOCUMENT.STORAGE~DATA/last-document.html
Documents are encrypted in transit and store in a secure repository |
|
Links to website....
http://www.avralab.com/CUSTOMER-DOCUMENT.STORAGE~DATA/last-document.html | |
There seems to be a lot of urls they are spamming out... here's a sample...
Pastebin Report: List of urls [1] | * DO NOT CLICK ON THEM * |
Once you arrive at the site an auto-download of a zip file takes place:
Inside the Zip file is a
windows executable:
MD5 Hashes:
3604454f3eb4794c1eb7d8d317f67220 | [1] |
Malware Information:
VirusTotal Report [1] (hits 3/57 Virus Scanners)
Malwr Report [1]
.Hybrid Analysis Report [1]
Summary:
Accesses potentially sensitive information from local browsers |
|
Cheers,
Steve
Sanesecurity.com
3 comments:
What does this virus actually do???
Accesses potentially sensitive information from local browsers, also downloads/contacts other servers around the world to download other malware :(
Thank for this blog! Awesome.
Post a Comment