Invoice for Payment plymouth.gov.uk 52405950469_Standard for Email and Print_1529708_EMAIL.doc macro malware.
These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.
It's not advised to ring them as there won't really be anything they can do to help you.
|
Header:
From: {CivicaReports@plymouth.gov.uk} Subject: Invoice for Payment |
Body:
THIS IS A POST-ONLY EMAIL. PLEASE DO NOT REPLY TO THIS MESSAGE. THIS EMAIL
ADDRESS IS NOT MONITORED FOR RESPONSES.
From: Plymouth LIVE SYSTEM
(New)
To: Ms Annette Watson
Please find attached your invoice for
payment in accordance with our agreed terms and conditions.
The invoice
is sent in PDF format. Double click on the attachment to open the
file.
PDF files require Adobe Acrobat Reader to view them. Download Adobe
Acrobat Reader free of charge from the Adobe website at
www.adobe.com/products/reader
For enquiries specifically relating to
this invoice, please e-mail : incomes@plymouth.gov.uk
This e-mail is
confidential and intended for the exclusive use of the addressee.
Any
views or opinions expressed in this e-mail do not necessarily represent those of
Plymouth City Council, and are not to be relied upon without subsequent written
confirmation by an authorised representative. If you are not the addressee, any
disclosure, reproduction, distribution, forwarding, or other dissemination or
use is strictly prohibited. If you have received this e-mail in error please
notify the Plymouth City Council Transaction Centre (incomes) helpdesk on 01752
304443
Plymouth City Council, The Civic Centre, Armada Way, Plymouth, PL1
2AA.
Telephone : 01752 668000 Website : www.plymouth.gov.uk |
|
|
|
Attachment:
52405950469_Standard for Email and Print_1529708_EMAIL.doc
Sha256 Hashes:
70f483f464b7f5e2361fd9eb5a3a90dbaed5f6cda7ba7628d7f2d9050722ad4f [1]
c7e31528eb9b11bdb035d00095ed8b3ad3c4179c6960764a56ac8ff565ae7c86 [2]
6cf70f0c0df1f9073326b5ae19726d68511f7938735069d4cd0c82f8ca31fe50 [3]
335f6af95b47573ac6ac7da619b9e40c1d9ac17e4bec71703e024b20e093237c [4]
89642abbfd4e8cc382f155b1d1b27c1aa94ced34636c1c6d0f34de19914e1b29 [5] |
Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 2/56)
VirusTotal Report: [2] (detection 2/56)
VirusTotal Report: [3] (detection 2/56)
VirusTotal Report: [4] (detection 2/56)
VirusTotal Report: [5] (detection 2/56)
Sanesecurity sigs (badmacro.ndb) detected this as:
Sanesecurity.Badmacro.Doc.CreObj |
NOTE
The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.
Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.
The auto-download file is normally a windows executable and so will not currently run on any operating system, apart from Windows.
However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.
Currently these attachments try to auto-download Dridex, which is designed to
steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste)) |
Cheers,
Steve
No comments:
Post a Comment