Amazon

Thursday, 15 January 2015

Invoice from Hexis {Invoice@hexis.co.uk} document malware

Invoice from Hexis {Invoice@hexis.co.uk} S-INV-CREATIFX document malware is being spammed out.
The Word document has a random attachment, however these emails aren't from HEXIS (UK) LIMITED  at all, they just being used to make the email look more genuine, ie. from a real company.

It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Update: Direct from Hexis themselves...  note, although they say they've been "hacked" they haven't been, it's just being faked:

Dear Customer,

Hexis UK Ltd has had their E-mail account hacked early this morning the hacker is sending emails that look like they are coming from Hexis with the following email address (invoice@hexis.co.uk).

If you receive an email from Hexis and are not expecting it then please DO NOT OPEN the email & simply delete it.

Please note that due to huge amount of emails that have been sent, we are receiving a very very high telephone demand from thousands of people.

Should you wish to place an order with Hexis then please bare with us or email us at sales@hexis.co.uk


We thank you for your understanding.

Message Header:
From: Invoice from Hexis {Invoice@hexis.co.uk}
Subject: Invoice

Message Body:
Sent 15 JAN 15 08:30

HEXIS (UK) LIMITED
7 Europa Way
Britannia Park
Lichfield
Staffordshire
WS14 9TZ

Telephone 01543 411221
Fax 01543 411246
Attachment:
S-INV-CREATIFX-465219.doc

Md5 Hashes:
7071702019e845579cefd35724d87944
b2356ce5a8f311df482d5b2a92e567ff

Malware Macro document information:

VirusTotal Report [1]
(hits 3/57 Virus Scanners)

VirusTotal Report [2]
(hits 0/21 Virus Scanners)

Malwr Report [1]

Decoded Macro [1]
Sanesecurity signatures are blocking this as: Sanesecurity.Malware.24679.DocHeur.

NOTE

The current round of Word and Excel attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))
Cheers,

Steve

No comments: