Thursday, 19 February 2015

Unpaid OutSec invoice (second reminder) accounts

Unpaid OutSec invoice (second reminder) accounts emails are being spammed out, with an attached excel document containing a macro.

These emails aren't from OutSec Ltd at all, they are just being used to make the email look more genuine, ie. from a real company.
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.
Message Header:
From: "OutSec Ltd." {}
Subject: Unpaid OutSec invoice (second reminder)

Message Body
This is the second message reminding you that we still cannot trace any payment for invoice 1404245 (total value £4.80, left to pay £4.80, due on 17/02/2015).
It would appear that your account is overdue. We would ask you to make the payment as soon as possible and confirm it immediately to If you have sent payment in the last 7 days please let us know. Please log into FileManager and select Master Menu/Invoices to view your payment history and current outstanding balance.
If you have a query regarding your account or disagree that this invoice is overdue ( we can make mistakes too!) please email Note that if we do not hear from you or receive the payment until 28 Feb 2015, your OutSec account will be suspended.

Accounts Department
OutSec Limited

Md5 Hashes:
307bb4b5c1ceedfe29a837524c2f8416 [1]
6cad1ce3e0dc8d39f38fbd8c2ba53914 [2]
944bf47ae650513abf5b75ccaece550e [3]

Malware Macro document information:

VirusTotal Report [1] (hits 0/57 Virus Scanners)

VirusTotal Report [2] (hits 0/57 Virus Scanners)

VirusTotal Report [3] (hits 0/57 Virus Scanners)

Malwr Report [1]
Malwr Report [2]
Malwr Report [3]


The current round of Word and Excel attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))



Anonymous said...

Thanks! I just got this email today. Figured it was suspicious. :-T

Anonymous said...

Thanks! I just got thE email today in Spain. I Figured too it was malware

Anonymous said...

Got 27 of these within an hour and eight minute time span today (2/19). All came from different source IPs. As the SPF did not pass, they all dropped into my quarantine (which I check periodically during the day).

Vijaya said...

I got it this morning. Thanks for keeping us informed.

Anonymous said...

Glad I checked this out your info was good confirmation of my suspicion.