Monday, 16 March 2015

Attached invoice from CMP word macro

Attached invoice from CMP ICI151586.DOC being spammed again with a word document.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Message Header::

From: "" {}
Subject: Attached invoice from CMP
Message Body:
The following are attached to this email:

If you have any queries relating to the attached document please contact the
 accounts department on 028 375 25427.

The information in this email is intended only for the addressee(s) named
 above. Access to this e-mail by anyone else is unauthorised. If you are not
 the intended recipient of this message any disclosure, copying, distribution
 or any action taken in reliance on it is prohibited and may be unlawful. CPM
 Ltd does not warrant that any attachments are free from viruses or other
 defects and accept no liability for any losses resulting from infected e-mail
Sha256 Hashes:
db3e6308564335022e38de73bdf6357e9879a0cc6af05d8aac33e7cc62b6a96a [1]
ecc57639ce5e33b9b40c546300a24cf49401d9c7ff8020a6f5b6323fc723f1cd [2]

Malware Macro document information:
VirusTotal Report [1] (Detection ratio 2 /57)
VirusTotal Report [2] (Detection ratio 2 /57)
Malwr Report [1]
Malwr Report [2]

Hybrid Analysis Report [1]
Hybrid Analysis Report [2]


The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))


No comments: