Friday, 27 February 2015

Delivery for package Failed

Delivery for package Failed is a macro enabled word document containing malware...
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Message Headers:
From: {}
Subject: Delivery for package # 7036733030540492 - Failed

Message Body:

Dear client,   
An unsuccessful delivery attempt was made for the parcel you are expecting ( tracking # 7036733030540492 ).  
The shipment status has changed to "Failed", because no person was present at the receiving address.  
Attached to this notification you will find the Delivery Notice Card, needed to reschedule the delivery.  
Label/Tracking Number: 7036733030540492  
Delivery Date: 26 February 2015  
Status: Failed  
Reason: No person present at delivery address  
Action: Delivery Notice Card e-copy sent  
The parcel can be picked up or scheduled for a new delivery, by visiting the nearest Canada Post office, with a printed copy of the attached Delivery Notice Card.  
The shipment will be canceled and the parcel returned to the sender, if a new delivery is not scheduled within 48 hours.  
Thank you
© 2015 Canada Post Corporation  
*** Do not reply, this email has been automatically generated ***
Attached filename:


Sha256 Hashes:
a26b29999d895a876bb15de25d82a7cfb151032dad08adf0668aa27aae16c076 [1]

Macro document information:

VirusTotal Report [1] (hits 11/57 Virus Scanners)

Malwr Report [1]

Hybrid Analysis Report [1]


The current round of Word and Excel attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))


No comments: