Another variant of the Senior Accounts Payable Specialist document, is being spammed out containing a macro embedded in a excel document
The Excel document has a random attachment and use a random company name...they just being used to make the email look more genuine, ie. from a real company.
Message Header:
Date: Wed, 07 Jan 2015 13:56:40 +0200
Subject: Invoice 2648.16 GBP
From: Josefa Sanders
|
Example Message Body:
Please find attached invoice for 2648.16 GBP.
Any queries please contact us.
Josefa Sanders
Senior Accounts Payable Specialist
OXFORD ADVANCED SURFACES GR PLC
|
Random Attachment name:
Md5 Hashes:
3a63ebdf4a0b34e38c7c1d54a6bb952e 650b3906f6f93a46fb68cfbbe46ef1ce cad6c0834c7519bcafcf6ba20eadb89a |
Malware Macro document information:
VirusTotal Report [1]
(hits 2/56 Virus Scanners)
VirusTotal Report [2]
(hits 2/56 Virus Scanners)
VirusTotal Report [3]
(hits 2/56 Virus Scanners)
Malwr Report [1]
Decoded Macro [1] |
NOTE
The current round of Word and Excel attachments are targeted at Windows users.
Apple and Android software can open these attachments and may even manage to run the macro
embedded inside the attachment.
The auto-download file is normally a windows executable and so will not currently run on any operating system, apart from Windows.
However, if you are an Apple/Android user and forward the message to a Windows user, you will
them put them at risk of opening the attachment and auto-downloading the malware.
Currently
these attachments try to auto-download Dridex, which is designed to
steal login information regarding your bank accounts (either by key
logging, taking auto-screens hots or copying information from your
clipboard (copy/paste))
|
Cheers,
Steve
No comments:
Post a Comment