Tuesday, 25 August 2015

david@ellesmere.engineering Visa Card Aug 2015 Visa Card Aug 2015.docm

david@ellesmere.engineering Visa Card Aug 2015 Visa Card Aug 2015.docm macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: {david@ellesmere.engineering}
Subject: Visa Card Aug 2015
Message Body:
Visa Card payments this month



Avast logo
This email has been checked for viruses by Avast antivirus software.
www.avast.com

Attachment:
Visa Card Aug 2015.docm
Sha256 Hashes:
863f21308fd95060d7c02a1037290f8249c3ea456ecf6991dc16c46b83919cf5 [1]
c4cd9f25dab7cd647dc1fffa052897fae747ad9b9144f056ce5af3e52b456862 [2]
9d7f5f07fe16900b082bf5f38ef5f900de12bced7147ba60fa2775f4f6b22b80 [3]
b4caa2ddeb11d065c7c19f9a9578ff7ed739364657ae46fe4b2b587994748f17 [4]
94900a62b812f9254341b461d6f29da953e3552180b4c74c26238049ae3bac91 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 7/57)
VirusTotal Report: [2] (detection 7/57)
VirusTotal Report: [3] (detection 7/57)
VirusTotal Report: [4] (detection 7/57)
VirusTotal Report: [5] (detection 7/57)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Friday, 14 August 2015

Roger Luke Bristol Rope & Twine Co 140238.XLS

Roger Luke Bristol Rope & Twine Co 140238.XLS macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: Roger Luke {rogerluke@bristolrope.co.uk}
Subject: Invoice
Message Body:
Thank you for your order.  Your Invoice - 14/0238 - from Bristol Rope &
Twine Co is attached.
Attachment:
140238.XLS
Sha256 Hashes:
f299af94bcb39bbcad5668ac9e7d0591ec7c6d90be2332f8fcbcbb8588be41d7 [1]
37d06af3d5915d734f1df9047afc0503aaa7f0abaf8ac399c6bcd3007e0b1b06 [2]
eef71cb1ef5a3073fceeaa22caa3e0448ebe69235f2767addf00de36d50f5eef [3]
2842c768ac58e274d30371b1e59bf988ff390f77220eb66ab7065af8db0ca97e [4]
8e700e4fd44337ef364e91db34cef9c441c18b720c7908d1842f556c9a698402 [5]
Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 6/57)
VirusTotal Report: [2] (detection 6/57)
VirusTotal Report: [3] (detection 6/57)
VirusTotal Report: [4] (detection 6/57)
VirusTotal Report: [5] (detection 6/57)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Thursday, 13 August 2015

Info from SantanderBillpayment.co.uk

Info from SantanderBillpayment.co.uk AccountDocuments.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: "Santanderbillpayment-noreply@SantanderBillPayment.co.uk"
Subject: Info from SantanderBillpayment.co.uk
Message Body:
Thank you for using BillPay. Please keep this email for your records.

For more details please check attached payment slip.

Your transaction reference number for this payment is IR5796563.

Please quote this reference number in any future communication regarding this payment.

Yours sincerely,

Banking Operations

This message is intended for the named person above and may be confidential, privileged or otherwise protected from disclosure. If it has reached you by mistake please contact the sender on 0300 200 3601 and delete the message immediately.
Attachment:
AccountDocuments.doc
Sha256 Hashes:
c683e3a12ab2e80aa4247a1c8ed6b9c565e0241212bc9730596e69ee54807b57 [1]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 5/57)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Bristan Documents INVOICE_I506195640.zip

Bristan Documents INVOICE_I506195640.zip attached...

Headers:
From: "Bristan Documents" {Prism@bristan.com}
Subject: Invoice I506195640
Message body:
Please find document(s) attached.
Attached to the message is a Zip file:
INVOICE_I506195640.zip
Inside the Zip file is a Windows Executable file:
INVOICE_I9288320.exe
Sha256 Hashes:
3eb08a1fc4c27ecc5bb1e512327fc645076b00c3a62555871d8b8ed395517c79    [1]
Anti virus reports:
VirusTotal Report: [1] (Detection 1/57)
Malwr Report: [1]
Hybrid Analysis Report: [1]

Cheers,
Steve
Sanesecurity.com

Tuesday, 11 August 2015

Here is your BT Website Invoice

Here is your BT Website Invoice DirectDebit Invoice_5262307_011220140151449702826.pdf macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: {btd.billing.noreply@bt.com}
Subject: Here is your BT Website Invoice
Message Body:
******Please do not reply to this automated e-mail as responses are not read******
Hello

Here is your latest billing information from BT Directories – please check the details carefully.

If you need to contact us then you'll find the numbers in the attachment.

Kind Regards

BT Directories Billing & Credit Management

www.marketing-solutions.bt.com

To ensure our future e-mails are delivered to your inbox and not treated as spam, please add 'btd.billing.noreply@bt.com' to your address book.

This e-mail contains attachments in Adobe Portable Document Format (PDF). If you do not have Adobe Reader on your computer, you can download it free using this link Download Adobe Reader



Attachment:
DirectDebit Invoice_5262307_011220140151449702826.pdf
Sha256 Hashes:
08af5513378e9186ba26b4ba1aa8b2e3951d61328f8d7a8c98a43f087cb7a97a [1]
0cbbb2707a88a3b65cbc1b6657081ea90c10a48418ccc99ef607cbb02c1bea9c [2]
5092aa1b3ff72a02c639560575251075e551497f4527ccb570dd446891a14aa2 [3]
9fde36d6b82a8c2f81448cf053ca74637bef98a6e0b8a8bdfbf11908840917e4 [4]
b2b42576b9f77a97a3f647fbfdbb2533672a51d417a9f9a8ae15d194899feaf8 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/56)
VirusTotal Report: [2] (detection 4/56)
VirusTotal Report: [3] (detection 4/56)
VirusTotal Report: [4] (detection 4/56)
VirusTotal Report: [5] (detection 4/56)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Interparcel Documents Shipping Labels (938854744923).pdf

Interparcel Documents Shipping Labels (938854744923).pdf macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: Interparcel {bounce@interparcel.com}
Subject: Interparcel Documents
Message Body:
Your Interparcel collection has been booked and your documents are ready.

There is a PDF document attached to this email called Shipping Labels (938854744923).pdf.
Please open and print this attachment and cut out the waybill images. They must be attached to your parcels before the driver arrives.

If you cannot open this attachment, please click here to download Adobe Acrobat Reader.

Thank you for booking with Interparcel.

Attachment:
Shipping Labels (938854744923).pdf
Sha256 Hashes:
08af5513378e9186ba26b4ba1aa8b2e3951d61328f8d7a8c98a43f087cb7a97a [1]
0cbbb2707a88a3b65cbc1b6657081ea90c10a48418ccc99ef607cbb02c1bea9c [2]
5092aa1b3ff72a02c639560575251075e551497f4527ccb570dd446891a14aa2 [3]
9fde36d6b82a8c2f81448cf053ca74637bef98a6e0b8a8bdfbf11908840917e4 [4]
b2b42576b9f77a97a3f647fbfdbb2533672a51d417a9f9a8ae15d194899feaf8 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/56)
VirusTotal Report: [2] (detection 4/56)
VirusTotal Report: [3] (detection 4/56)
VirusTotal Report: [4] (detection 4/56)
VirusTotal Report: [5] (detection 4/56)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Monday, 10 August 2015

Your order 10232 from Create Blinds Online: Paid invoice-10232.doc

Your order 10232 from Create Blinds Online: Paid invoice-10232.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: orders@createblindsonline.co.uk
Subject: Your order 10232 from Create Blinds Online: Paid
Message Body:
We would like to thank you for your recent order.

Order Status updated on: 10/08/2015
Your Customer ID: 1761
Your Order ID: 10232
Invoice Number: 10232
Delivery Note:

We received your order and payment on Aug/102015

Your order details are attached:

Kind regards
Create Blinds Online Team

Attachment:
invoice-10232.doc
Sha256 Hashes:
cf24a2f8d08584f6ea2fbfcaa2f43caf5d77365aef977a678201cf1c4c037d31 [1]
0d917831636f69503b6f0a96e27958c1727303042c7832e36c8516292e5f1165 [2]
aa5d2ced624a76faf7381ba0e69e7346752c32426e9eba89b7ac0a79812d9b28 [3]
9713d769565afab2b1466819aca81f7bcfefb10b978e92fe66d2146e253cc04e [4]
2eac3af6e6d37a946a4b3f1ed99757f871f75fa38dc6527f7d5c2a76ee63f3ad [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 5/56)
VirusTotal Report: [2] (detection 5/56)
VirusTotal Report: [3] (detection 5/56)
VirusTotal Report: [4] (detection 5/56)
VirusTotal Report: [5] (detection 5/56)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Thursday, 6 August 2015

Voice message from 07773403290 voiplicity

Voice message from 07773403290 voiplicity fakes with a zip attachment...

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Headers:
From: "tel: 07773403290" {non-mail-user@voiplicity.co.uk}
Subject: RE: Voice message from 07773403290
Message Body:
The attached message was recently left in your voicemail account. We are sending you this email because you have asked for your messages to be forwarded to this address.
The original message is still in your account.

Attached to the message is a Zip file:
message_01983527496.wav.zip
Inside the Zip file is a Windows Executable file:
message_01983527496.exe

Sha256 Hashes:
25a283556840d41562f44b97ec08e80cf722644b521e8dc7940e29eb79a85c33 [1]
Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 2/55)
Cheers,
Steve

Wednesday, 5 August 2015

Booking Confirmation - Accumentia (16/9/15) David Nyaruwa

 Booking Confirmation - Accumentia (16/9/15) David Nyaruwa Accumentia Booking (16-9-15).doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: David Nyaruwa {david.nyaruwa@soci.org}
Subject: Booking Confirmation - Accumentia (16/9/15)
Message Body:
Please find attached a proforma invoice for Accumentia’s booking of the council room on 16/09/15. The deposit to confirm the booking is 25% (ie £205.50) with the balance due by the date of the meeting.

Regards,

David Nyaruwa
Project Accountant
SCI, 14-15 Belgrave Square, London, SW1X 8PS
T: +44 (0)20 7598 1536  E: mailto:david.nyaruwa@soci.org W: www.soci.org
SCI - where science meets business

Phenotypic Approaches in Drug Discovery,  18 March 2015, SCI, London, UK
Arrested Gels: Dynamics, Structure and Application, 23-25 March 2015, Gonville & Caius, Cambridge, UK
32nd Process Development Symposium, 25-27 March 2015, Churchill College, Cambridge, UK
Reagentless Synthesis, 1 April 2015, SCI, London, UK

For the full events listing and more information go to http://www.soci.org/Events

Attachment:
Accumentia Booking (16-9-15).doc
Sha256 Hashes:
08f309a099ca24a110088d9d6f386dec982c343c71989a2e77dd8ac0bb95bff2 [1]
098344c88f9c2bd31e80410456ee1805acc56b562c6593d4d16b642362bcf944 [2]
236c724d2aa44d57361ca825878aaac44b2855a2a0b8c79fdf6594fe7531c32b [3]
3e9ae31f74f9b78619be6fa25279c86d13ac960257e9578d40018e6e81f005eb [4]
b0d47b1815494206a4e35a414caf17c39f8ce4677e563485e89ddbfee726d015 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 7/56)
VirusTotal Report: [2] (detection 7/56)
VirusTotal Report: [3] (detection 7/56)
VirusTotal Report: [4] (detection 7/56)
VirusTotal Report: [5] (detection 7/56)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

IMPORTANT - Document From Ofcom Spectrum Licensing

IMPORTANT - Document From Ofcom Spectrum Licensing OFCOM_REN04_20150715_0976659.docm  macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: {Spectrum.licensing@ofcom.org.uk}
Subject: IMPORTANT - Document From Ofcom Spectrum Licensing
Message Body:
Dear Sir/Madam,

Please find attached an electronic version of important documents relating to your Wireless Telegraphy licence or application.

Please read the document carefully and keep it for future reference.

If any details within this letter are incorrect, please notify Ofcom Spectrum Licensing as soon as possible. It is the Licensee's responsibility to ensure all information we hold is correct and current.

If you have any enquiries relating to this document, please email
spectrum.licensing@ofcom.org.uk

Yours faithfully,


Ofcom Spectrum Licensing
Riverside House
2a Southwark Bridge Road
London SE1 9HA

Phone: 020 7981 3131
Fax: 020 7981 3235
Textphone: 020 7981 3043



Attachment:
OFCOM_REN04_20150715_0976659.docm
Sha256 Hashes:
1621100f6132a3e077f830df789eff30c55f2ba4f10a3a82844415cd2d4e5f58 [1]
71c76d5248f0a8cfb4c9c3b82e358eff0f6aba9619023e55f530825d71417336 [2]
f9d283ab46e11d59af2a64bda538045bf5ccc62de4772b1b73f68109ab2e93cd [3]
3f23b47564cfada12ca18f18f51215bf0e6747419249db1c3d71887e55a16b8a [4]
d5d3cd83d04116219a4a1b382a85b1142c02741600ce5b1297be9a334f8aeaae [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 6/56)
VirusTotal Report: [2] (detection 6/56)
VirusTotal Report: [3] (detection 6/56)
VirusTotal Report: [4] (detection 6/56)
VirusTotal Report: [5] (detection 6/56)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Monday, 3 August 2015

E-bill : 6200228913 - 31.07.2015 - 0018 Lyreco

E-bill : 6200228913 - 31.07.2015 - 0018 Lyreco 0018_6200228913.docm macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: noreply.UK.ebiller@lyrecobusinessmail.com
Subject: E-bill : 6200228913 - 31.07.2015 - 0018
Message Body:
Dear customer,

Please find enclosed your new Lyreco invoicing document nA^� 6200228913 for a total amount of 43.20 GBP, and
due on 31.08.2015

We would like to remind you that all of your invoices are archived electronically free of charge and can be reviewed by

you at any time.

For any questions or queries regarding your invoices, please contact Customer Service on Tel : 0845 7676999*.

Your Lyreco Customer Service

*** Please do not reply to the sender of this email.
This e-mail, including any attachments to it, may contain company confidential and/or personal information.
If you have received this e-mail in error, you must not copy, distribute, or disclose it, use or take any action based on the
information contained within it.

Please notify immediately by return e-mail of the error and then delete the original e-mail by replying to
wise.cs.iqt@lyreco.com ***

Attachment:
0018_6200228913.docm
Sha256 Hashes:
4a250f8aaa13ca92263cec4351c05815625d0f959eac0ebbda5b341fc08047f0 [1]
a9f6427bda1f519341d52b3e02372c2bc2d5d1487fd01b7d831306888bdf98c5 [2]
e01772e2b66d664fa3e70ecaa5f32360333c57a68d53555c40de33d666e4b961 [3]
37ffddb769236811ab870e541356fe7d9d53e8745452c7cc4e2eb9569b793300 [4]
0dd453e19bbafb1d2d6e6d9ff4bfaabc9f14848a47de45985c481237e705849b [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 5/56)
VirusTotal Report: [2] (detection 5/56)
VirusTotal Report: [3] (detection 5/56)
VirusTotal Report: [4] (detection 5/56)
VirusTotal Report: [5] (detection 5/56)

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve