Amazon

Tuesday, 30 June 2015

Bank payment SBP Beauty & Lifestyle sarah@hairandhealth.co.uk

Bank payment SBP Beauty & Lifestyle sarah@hairandhealth.co.uk doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: {sarah@hairandhealth.co.uk}
Subject: Bank payment

Message Body:
Please find attached a bank payment for 28th June 2015 for £288.00
to pay inv 1631 less cr 1129. With thanks.

Kind regards

Sarah
Accounts
SBP Beauty & Lifestyle
Attachment:
Bank payment 281014.doc
Sha256 Hashes:
0cc85865bb925105641fc4b172ac9c547393c42f1d074e4f9e0b850ed4018363 [1]
4dbec0ccf894d5d3a8c4bff3555e24770d24231bdd3f648b18f926c2b5f15a5b [2]
50fa7ce0c13cdeac8006f12ae4669192cb53adf5953ce48c387ecc1bdb13c270 [3]
e14b3d3487e112648002d70db804e24e2d123d3ecb22f2e2cbd0276bd743a815 [4]
fd096ae066690865715e9dbb5e4bcd2c86160c5f5fca796694345263886f3c75 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 3/55)
VirusTotal Report: [2] (detection 3/55)
VirusTotal Report: [3] (detection 3/55)
VirusTotal Report: [4] (detection 3/55)
VirusTotal Report: [5] (detection 3/55)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Payment due - 75805 donna.vipond@ev-ent.co.uk

Payment due - 75805 donna.vipond@ev-ent.co.uk doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: "Donna Vipond" {donna.vipond@ev-ent.co.uk}
Subject: Payment due - 75805

Message Body:
Please advise when we can expect to receive payment of the attached invoice now due?  I await to hear from  you.
Kind Regards
Donna Vipond
Accounts
Event Furniture Ltd T/A Event Hire
Tel: 01922 628961 x 201
Attachment:
75805.doc
Sha256 Hashes:
N/A

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection x/xx)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Monday, 29 June 2015

CEF Documents City Electrical Factors Limited BLA176035.doc

CEF Documents City Electrical Factors Limited BLA176035.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: "Dawn.Sandel@cef.co.uk" {Dawn.Sandel@cef.co.uk}
Subject: CEF Documents

Message Body:
Please find attached the following documents issued by City Electrical Factors:

Invoice - BLA/176035 - DUCHMAID

If you have any problems or questions about these documents then please do not hesitate to contact us.

Regards,
Dawn Sandel
Phone: 01282 698 112
Fax: 01282 696 818


Dawn Sandel
Group Office
Nelson & Northwest Region

City Electrical Factors Limited
Tel: 01282 698 112  Fax: 01282 696 818
11 Kenyon Road, Lomeshaye Industrial Estate, Nelson, BB9 5SP
Attachment:
BLA176035.doc
Sha256 Hashes:
1dd4601705e197fe4528a50a4cca282ea9ffb45249ff5fdb3d538a79dccea157 [1]
96de9b01e7e403388f92696c1f7f14b85e373962824aa248ca144f9314f5ffb3 [2]
c1188f42836fce82819134340b1726fdb1ee3234aaaef1674924602ead39b1ef [3]
846c9403e3059012f44a4b6e6ac77a34aec313e9979ae039f767e79685623e53 [4]
83bbeab07a972de567fe418babb9023f185c6ed2b62d09a241698c7886170876 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

WhatsApp Chat with Jay Stephenson

Subject: WhatsApp Chat with Jay Stephenson  macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

Subject: WhatsApp Chat with Jay Stephenson

Message Body:
Chat history is attached as “‪WhatsApp Chat: Jay Stephenson.txt‬” file to this email.
Attachment:
WhatsApp Chat: Jay Stephenson.doc
Sha256 Hashes:
1dd4601705e197fe4528a50a4cca282ea9ffb45249ff5fdb3d538a79dccea157 [1]
96de9b01e7e403388f92696c1f7f14b85e373962824aa248ca144f9314f5ffb3 [2]
c1188f42836fce82819134340b1726fdb1ee3234aaaef1674924602ead39b1ef [3]
846c9403e3059012f44a4b6e6ac77a34aec313e9979ae039f767e79685623e53 [4]
83bbeab07a972de567fe418babb9023f185c6ed2b62d09a241698c7886170876 [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

Friday, 26 June 2015

Email from Transport for London cclondon.com

Email from Transport for London cclondon.com AP0210932630.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:

From: {noresponse@cclondon.com}
Subject: Email from Transport for London

Message Body:
Dear Customer,

Please open the attached file to view correspondence from Transport for
London.

If the attachment is in DOC format you may need Adobe Acrobat Reader to
read or download this attachment.

Thank you for contacting Transport for London.



Business Operations
Customer Service Representative
Attachment:
AP0210932630.doc
Sha256 Hashes:
25e247c71cd4a50f5c97e3b69807faa5ac048da050c0180fd881f75d1577fe66 [1]
369c3e84e9a288b3f2df0672c3dd2eaa208c9d2e6ac10c36a04b9e3ff52f8b4d [2]
404a73f3cb148dfdd1e75aa498c7a8098352f4014eedf50c77db2c299bf70f24 [3]
a97b05797f326e8e8ba79f12d15a523096be31b13c19d7569b82995b957616ec [4]
fe9097d91e65bd70b4ae777e8fbdb139d39f0baadeca4ab40e9b584b002a2f1d [5]

Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 4/57)
VirusTotal Report: [2] (detection 4/57)
VirusTotal Report: [3] (detection 4/57)
VirusTotal Report: [4] (detection 4/57)
VirusTotal Report: [5] (detection 4/57)

NOTE

The current round of Word/Excel/XML attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve