Tuesday, 30 June 2015

Bank payment SBP Beauty & Lifestyle sarah@hairandhealth.co.uk

Bank payment SBP Beauty & Lifestyle sarah@hairandhealth.co.uk doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: {sarah@hairandhealth.co.uk}
Subject: Bank payment

Message Body:
Please find attached a bank payment for 28th June 2015 for £288.00
to pay inv 1631 less cr 1129. With thanks.

Kind regards

Sarah
Accounts
SBP Beauty & Lifestyle
Attachment:
Bank payment 281014.doc
Sha256 Hashes:
0cc85865bb925105641fc4b172ac9c547393c42f1d074e4f9e0b850ed4018363 [1]
4dbec0ccf894d5d3a8c4bff3555e24770d24231bdd3f648b18f926c2b5f15a5b [2]
50fa7ce0c13cdeac8006f12ae4669192cb53adf5953ce48c387ecc1bdb13c270 [3]
e14b3d3487e112648002d70db804e24e2d123d3ecb22f2e2cbd0276bd743a815 [4]
fd096ae066690865715e9dbb5e4bcd2c86160c5f5fca796694345263886f3c75 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 3/55)
VirusTotal Report: [2] (detection 3/55)
VirusTotal Report: [3] (detection 3/55)
VirusTotal Report: [4] (detection 3/55)
VirusTotal Report: [5] (detection 3/55)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Payment due - 75805 donna.vipond@ev-ent.co.uk

Payment due - 75805 donna.vipond@ev-ent.co.uk doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: "Donna Vipond" {donna.vipond@ev-ent.co.uk}
Subject: Payment due - 75805

Message Body:
Please advise when we can expect to receive payment of the attached invoice now due?  I await to hear from  you.
Kind Regards
Donna Vipond
Accounts
Event Furniture Ltd T/A Event Hire
Tel: 01922 628961 x 201
Attachment:
75805.doc
Sha256 Hashes:
N/A

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection x/xx)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Monday, 29 June 2015

CEF Documents City Electrical Factors Limited BLA176035.doc

CEF Documents City Electrical Factors Limited BLA176035.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: "Dawn.Sandel@cef.co.uk" {Dawn.Sandel@cef.co.uk}
Subject: CEF Documents

Message Body:
Please find attached the following documents issued by City Electrical Factors:

Invoice - BLA/176035 - DUCHMAID

If you have any problems or questions about these documents then please do not hesitate to contact us.

Regards,
Dawn Sandel
Phone: 01282 698 112
Fax: 01282 696 818


Dawn Sandel
Group Office
Nelson & Northwest Region

City Electrical Factors Limited
Tel: 01282 698 112  Fax: 01282 696 818
11 Kenyon Road, Lomeshaye Industrial Estate, Nelson, BB9 5SP
Attachment:
BLA176035.doc
Sha256 Hashes:
1dd4601705e197fe4528a50a4cca282ea9ffb45249ff5fdb3d538a79dccea157 [1]
96de9b01e7e403388f92696c1f7f14b85e373962824aa248ca144f9314f5ffb3 [2]
c1188f42836fce82819134340b1726fdb1ee3234aaaef1674924602ead39b1ef [3]
846c9403e3059012f44a4b6e6ac77a34aec313e9979ae039f767e79685623e53 [4]
83bbeab07a972de567fe418babb9023f185c6ed2b62d09a241698c7886170876 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

WhatsApp Chat with Jay Stephenson

Subject: WhatsApp Chat with Jay Stephenson  macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

Subject: WhatsApp Chat with Jay Stephenson

Message Body:
Chat history is attached as “‪WhatsApp Chat: Jay Stephenson.txt‬” file to this email.
Attachment:
WhatsApp Chat: Jay Stephenson.doc
Sha256 Hashes:
1dd4601705e197fe4528a50a4cca282ea9ffb45249ff5fdb3d538a79dccea157 [1]
96de9b01e7e403388f92696c1f7f14b85e373962824aa248ca144f9314f5ffb3 [2]
c1188f42836fce82819134340b1726fdb1ee3234aaaef1674924602ead39b1ef [3]
846c9403e3059012f44a4b6e6ac77a34aec313e9979ae039f767e79685623e53 [4]
83bbeab07a972de567fe418babb9023f185c6ed2b62d09a241698c7886170876 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Friday, 26 June 2015

Email from Transport for London cclondon.com

Email from Transport for London cclondon.com AP0210932630.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: {noresponse@cclondon.com}
Subject: Email from Transport for London

Message Body:
Dear Customer,

Please open the attached file to view correspondence from Transport for
London.

If the attachment is in DOC format you may need Adobe Acrobat Reader to
read or download this attachment.

Thank you for contacting Transport for London.



Business Operations
Customer Service Representative
Attachment:
AP0210932630.doc
Sha256 Hashes:
25e247c71cd4a50f5c97e3b69807faa5ac048da050c0180fd881f75d1577fe66 [1]
369c3e84e9a288b3f2df0672c3dd2eaa208c9d2e6ac10c36a04b9e3ff52f8b4d [2]
404a73f3cb148dfdd1e75aa498c7a8098352f4014eedf50c77db2c299bf70f24 [3]
a97b05797f326e8e8ba79f12d15a523096be31b13c19d7569b82995b957616ec [4]
fe9097d91e65bd70b4ae777e8fbdb139d39f0baadeca4ab40e9b584b002a2f1d [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Notification of Vehicle Tax DD Payment Schedule (Ref: 000000-000005-274421-001)

 Notification of Vehicle Tax DD Payment Schedule (Ref:  000000-000005-274421-001) FG08OEE.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: directdebit@taxdisc.service.gov.uk
Subject: Notification of Vehicle Tax DD Payment Schedule (Ref:
 000000-000005-274421-001)

Message Body:

Important: Confirmation of your successful
Direct Debit instruction

Dear customer
Vehicle registration number: FG08OEE
Thank you for arranging to pay the vehicle tax by Direct Debit.
Please can you check that the details attached below, and your payment schedule are correct.
If any of the above financial details are incorrect please contact your bank as soon as possible.
However, if your details are correct you don’t need to do anything and your Direct Debit will be processed as normal. You have the right to cancel your Direct Debit at any time. A copy of the Direct Debit Guarantee is included with this letter.
For your information, the collection will be made using this reference, and this is how your payment will be detailed on your bank statements:
  • DVLA Identifier: 295402
  • Reference: FG08OEE
Your vehicle tax will automatically renew unless you notify us of any changes. We will send a new payment schedule at the time of renewal.
Yours sincerely

Rohan Gye
Vehicles Service Manager
Attachment:
FG08OEE.doc
Sha256 Hashes:
25e247c71cd4a50f5c97e3b69807faa5ac048da050c0180fd881f75d1577fe66 [1]
369c3e84e9a288b3f2df0672c3dd2eaa208c9d2e6ac10c36a04b9e3ff52f8b4d [2]
404a73f3cb148dfdd1e75aa498c7a8098352f4014eedf50c77db2c299bf70f24 [3]
a97b05797f326e8e8ba79f12d15a523096be31b13c19d7569b82995b957616ec [4]
fe9097d91e65bd70b4ae777e8fbdb139d39f0baadeca4ab40e9b584b002a2f1d [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Scanned from a Xerox Multifunction Printer doc malware

Scanned from a Xerox Multifunction Printer.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

Subject: Scanned from a Xerox Multifunction Printer

Message Body:
Please open the attached document.  It was scanned and sent to you using a Xerox Multifunction Printer.

Attachment File Type: DOC, Multi-Page

Multifunction Printer Location:
Device Name: XRX9C934E5EEC46


For more information on Xerox products and solutions, please visit http://www.xerox.com
Attachment:
Scanned from a Xerox Multifunction Printer.doc
Sha256 Hashes:
25e247c71cd4a50f5c97e3b69807faa5ac048da050c0180fd881f75d1577fe66 [1]
369c3e84e9a288b3f2df0672c3dd2eaa208c9d2e6ac10c36a04b9e3ff52f8b4d [2]
404a73f3cb148dfdd1e75aa498c7a8098352f4014eedf50c77db2c299bf70f24 [3]
a97b05797f326e8e8ba79f12d15a523096be31b13c19d7569b82995b957616ec [4]
fe9097d91e65bd70b4ae777e8fbdb139d39f0baadeca4ab40e9b584b002a2f1d [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Monday, 22 June 2015

Shareholder alert Glen McCoy instructions.zip

Shareholder alert Glen McCoy with a malware instructions.zip attached...

Headers:
Subject: Shareholder alert
Message body:
Hope this e-mail finds You well. Please note that in 2015 no dividends will be paid due to resolution of the Board of Directors. Please see attached.     Glen McCoy, Partner
Attached to the message is a Zip file:
instructions.zip
Inside the Zip file is a Windows Executable file:
 instructions_document.exe
Sha256 Hashes:
0203b56db2c0ad655213af0871473cc88169b7b1320550d1fe4d19f93def8507   [1]
Anti virus reports:
VirusTotal Report: [1] (Detection 1/57)
Malwr Report: [1]
Hybrid Analysis Report: [1]

Cheers,
Steve
Sanesecurity.com

Tuesday, 16 June 2015

Eclipse Internet Invoice is available online

Eclipse Internet Invoice is available online - 85613950EC macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: customer@eclipse.net.uk
Subject: Eclipse Internet Invoice is available online - 85613950EC

Message Body:
Dear Customer,

Thank you for choosing to receive your invoice by email. Please find this attached.

If you would like to change any of your billing options, please log in to My Eclipse using your registration email and password, at www.eclipse.net.uk/billing. Alternatively, you can contact our Customer Service Team, Monday to Friday 8am - 6pm, on the telephone number published at www.eclipse.net.uk.

Kind regards

Eclipse Internet

 Attachment:
EC_85613950_10190965.doc
Sha256 Hashes:
46ed96fceea77035271bd70677187a162f768d3b4a5b992afd02d65d7dbeee8c [1
a6db40b6751b42e6bb53aaf6b92657b5c1042ef66f3cc5b5dabae488356038e3 [2]
dd046c529c0f13cd5c3a6f61aac3b650f6ba8a36533706d0f705ce1618388c1d [3]
2fb05492886bfab3a1163a0992d0ca7bbff2d07c927c4add4839966eaa53516a [4]
d50f6b6cd94eaa6cc86b4f90bc2c2b956cda19a68a2f9f27e4b05f3bdd21bb10 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Monday, 15 June 2015

Will Kinghan New Doc henryhowardfinance.co.uk

 Will Kinghan New Doc henryhowardfinance.co.uk New doc.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: Will Kinghan {WKinghan@hhf.uk.com}
Subject: New Doc

Message Body:
Hello,

My apologies again.

Document attached

Will

With kind regards,

Will Kinghan
Account Manager
T: 01633 415235 |M: 07468723790| E: wkinghan@hhf.uk.com

www.henryhowardfinance.co.uk

Head Office

T
: 01633 415222  | F: 01633 415223
Unit 5
| Langstone Business Village | Langstone Park | Langstone | Newport | Gwent | NP18 2LH   

 Attachment:
New doc.doc
Sha256 Hashes:
163298d1e1657833db1c591fba424d9a1e26f894e957b9810f150a0e95991dcd [1]
412a6c4ec8d4adbc9418f9857d13e3513771a731241eb16b46dce8d40311ce41 [2]
4b8a883a69576f6b80e1b304c462ee027b57dfa379f53ab7611d11f743e699cf [3]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 3/57)
VirusTotal Report: [2] (detection 3/57)
VirusTotal Report: [3] (detection 3/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

[Nyfast] Payment accepted 101153.doc

[Nyfast] Payment accepted 101153.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

Subject: [Nyfast] Payment accepted
From: Nyfast {sales@nyfast.com}

Message Body:
Hi ,
Thank you for shopping with Nyfast!
 
Order ZUJIEQGQV - Payment processed
Your payment for order with the reference ZUJIEQGQV was successfully processed.
 
You can review your order and download your invoice from the "Order history" section of your customer account by clicking "My account" on our shop.
If you have a guest account, you can follow your order via the "Guest Tracking" section on our shop.

 Attachment:
101153.doc
Sha256 Hashes:
163298d1e1657833db1c591fba424d9a1e26f894e957b9810f150a0e95991dcd [1]
412a6c4ec8d4adbc9418f9857d13e3513771a731241eb16b46dce8d40311ce41 [2]
4b8a883a69576f6b80e1b304c462ee027b57dfa379f53ab7611d11f743e699cf [3]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 3/57)
VirusTotal Report: [2] (detection 3/57)
VirusTotal Report: [3] (detection 3/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Wednesday, 10 June 2015

Your monthly BTT telephone bill Hayley Sweeney admins@bttcomms.com

Your monthly BTT telephone bill Hayley Sweeney admins@bttcomms.com Invoice_68362.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: Hayley Sweeney {admins@bttcomms.com}
Subject: Your monthly BTT telephone bill

Message Body:
Please find attached your telephone bill for last month.
This message was sent automatically.
For any queries relating to this bill, please contact Customer Services on 01536 211100.

 Attachment:
Invoice_68362.doc
Sha256 Hashes:
bba2cce71f9c253a34dae8887effeff97874ee3a941f2fa42015aea04f581168 [1]
cd88f730db594ce26d2a82d93f7511828b9d07cfc1bc53c5711f430064cccdcf [2]
eff01d391b8f2a2f7a2d661a112e0bc47835188a9dc963fbc8e1c2d77a59bc61 [3]
f09f4e090cd8bab6b430ade5be9b38047e525e66f578370edcc44ef25ef8f2b1 [4]
fd4a7d139d44b20825fe2b74f64f2656fb8d14aab618b65b62705dbd1c43876d [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 5/57)
VirusTotal Report: [2] (detection 5/57)
VirusTotal Report: [3] (detection 5/57)
VirusTotal Report: [4] (detection 5/57)
VirusTotal Report: [5] (detection 5/57)


NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Tuesday, 9 June 2015

steve.tasker Password Confirmation thomashiggins.com

steve.tasker Password Confirmation thomashiggins.com 1913.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: steve.tasker785@thomashiggins.com
Subject: Password Confirmation  [261897707725] T82

Message Body:
Full document is attached

 Attachment:
1913.doc
Sha256 Hashes:
a6e1043afe619b02cf4fb43c460bf1827010d03a2010571d1e4b2f5ee66a6825 [1]
bbb3958f20991520cac5f52e57befc3b9527ad6a7829cbd1e3ccabe5d2f66369 [2]
9dc725615952bb0601fc957a3b05428d9407bdaaebefaaea78e9f46c6592e9e3 [3]
9c453a02704170948a0842a446fb247bd1e7e1d71414552f31e64982db91e7b1 [4]
4f765fb551e2dfd99fa5b10f78363ca63b579132b094981aaab609880f6cc676 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 2/57)
VirusTotal Report: [2] (detection 2/57)
VirusTotal Report: [3] (detection 2/57)
VirusTotal Report: [4] (detection 2/57)
VirusTotal Report: [5] (detection 2/57)


NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Monday, 8 June 2015

Bank payment sarah@hairandhealth.co.uk

Bank payment sarah@hairandhealth.co.uk Bank payment 100615.pdf macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: sarah@hairandhealth.co.uk
Subject: Bank payment

Message Body:
Dear client

Please find attached a bank payment for £3625.10 dated 10th June 2015 
to pay invoice 1757.  With thanks.

Kind regards

Sarah
Accounts

 Attachment:
Bank payment 100615.pdf
Sha256 Hashes:
48708920689898e49b95fa8716072cfa8dde65063b3455c0fbd3d1973efa8000 [1]
80410f74dca5ffae069fa4a07c368e749f351ffe385432ab816b64024697a06e [2]
837665851dbf56847df9c1632ee725e793f75a2018fc3793f825666b81bb06db [3]
a2492880d31105a93dc9f04db62a724c268daa926fa1aa23dcf7e7969c40da8d [4]
f4e26d1d100e2f1d0fc0a91cec4c280ab69b536e69340be39253c7c4db9ca8de [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 2/57)
VirusTotal Report: [2] (detection 2/57)
VirusTotal Report: [3] (detection 2/57)
VirusTotal Report: [4] (detection 2/57)
VirusTotal Report: [5] (detection 2/57)

Hybrid Analysis Report: [3]

Malwr Report: [3]

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve