FYI...
Fake 'Customer message' SPAM - delivers Trickbot
- https://myonlinesecu...-bank-messages/
31 Aug 2017 - "... imitating NatWest Bank and using the same look-a-like domain as yesterday’s version[1]... using a slightly different email message. They have even re-used the same domains to deliver the actual payload, but with different file names.
[1] https://myonlinesecu...banking-trojan/
An email with the subject of 'Customer message' pretending to come from NatWest bank but actually coming from a look-a-like domain noreply@ servicemessage### .ml with a malicious word doc attachment is today’s latest spoof of a well-known company, bank or public authority delivering Trickbot banking Trojan. The ### is any number between 1 and 599...
Screenshot: https://myonlinesecu...mer-message.png
natwest112543798124_21454.doc - Current Virus total detections 5/58*. Payload Security**.
This malware file downloads from
http ://campuslinne .com/maquette2/nataresonodor.png which of course is -not- an image file but a renamed .exe file that gets renamed to Ubqwyc.exe (VirusTotal 15/65***). An alternative download location is
http ://campusassas .com/imagesv1/nataresonodor.png
This email attachment contains a genuine word doc with a macro script that when run will infect you.
The word doc looks identical to yesterday’s but with a different document name:
> https://myonlinesecu...087_352_doc.png
... DO NOT follow the advice they give to enable macros or enable editing to see the content..."
* https://www.virustot...sis/1504181231/
natwest112543798124_21454.doc
** https://www.hybrid-a...vironmentId=100
Contacted Hosts
193.227.248.241
216.239.32.21
67.21.84.23
216.58.209.228
216.58.209.238
66.85.27.170
*** https://www.virustot...b6ddd/analysis/
Ubqwyc.exe
campuslinne .com: 193.227.248.241: https://www.virustot...41/information/
> https://www.virustot...7bf64/analysis/
campusassas .com: 193.227.248.241
> https://www.virustot...0dd87/analysis/
___
Fake 'Important Documents' SPAM - delivers Trickbot
- https://myonlinesecu...banking-trojan/
31 Aug 2017 - "An email with the subject of 'Important – New Account Documents' pretending to come from Santander Bank but actually coming from a look-a-like domain Santander <account.documents@ santanderdoc .co.uk> or Santander <account.documents@ santandersec .co.uk> with a malicious word doc attachment is another spoof of a well-known company, bank or public authority delivering Trickbot banking Trojan...
Screenshot: https://myonlinesecu...t-Documents.png
Account_Documents_31082017.doc - Current Virus total detections 10/58*. Payload Security**.
This malware file downloads from
http ://evaluator-expert .ro/sergio.png which of course is -not- an image file but a renamed .exe file that gets renamed to bicprcv.exe (VirusTotal 17/64***).
An alternative download location is
http ://www.events4u .cz/sergio.png
This email attachment contains a genuine word doc with a macro script that when run will infect you.
The word doc looks like:
> https://myonlinesecu...1082017_doc.png
... DO NOT follow the advice they give to enable macros or enable editing to see the content..."
* https://www.virustot...3a505/analysis/
Account_Documents_31082017.doc
** https://www.hybrid-a...vironmentId=100
Contacted Hosts
93.114.64.118
146.255.36.1
194.87.238.42
66.85.27.170
216.58.209.228
216.58.209.238
*** https://www.virustot...65987/analysis/
bicprcv.exe
evaluator-expert .ro: 93.114.64.118: https://www.virustot...18/information/
> https://www.virustot...099bb/analysis/
events4u .cz: 93.185.102.11: https://www.virustot...11/information/
> https://www.virustot...6d3f8/analysis/
Edited by AplusWebMaster, 31 August 2017 - 02:59 PM.