FYI...
'Here you have...' SPAM/virus
-
http://isc.sans.edu/...ml?storyid=9529
Last Updated: 2010-09-09 21:49:06 UTC ...(Version: 2) - "We are aware of the "Here you have" malware that is spreading via email. As we find out more, we'll update this diary.
Update: 2010-09-09 21:28 UTC (JAC) There are several good writeups on the behavior of this malware see some of the references below. The spam contains a link to a document, the link looks like it is to a PDF, but is, in fact, to a .SCR file and served from a different domain from what the link appears to point to. The original file seems to have been removed, so further infections from the initial variant should not occur, but
new variants may well follow. The .SCR when executed downloads a number of additional tools, one of which appears to attempt to check in with a potential controller. The name associated the controller has been sink-holed. The malware attempts to deactivate most anti-virus packages and uses the infected user's Outlook to send out its spam.
References:
http://www.virustota...4b7-1284058335#
File name:
PDF_Document21_025542010_pdf.scr
Submission date: 2010-09-09 18:52:15 (UTC)
Result:
13/43 (30.2%)
http://www.threatexp...192fb46cd0cc9c9
http://www.threatexp...b974a2d9da7bc61
http://www.avertlabs...you-have-virus/
-
http://sunbeltblog.b...-have-worm.html
September 10, 2010 - "... The subject line on the email was “Here you have” or “Just For you”..."
-
https://kc.mcafee.co...=...7&actp=LIST
Last Modified: September 09, 2010 - "... confirmation that some customers have received large volumes of spam containing a link to malware, a mass-mailing worm identified as VBMania. The symptom reported thus far is that
the spam volume is overwhelming the email infrastructure. Static URLs in the email link to a .SCR file. McAfee recommends that customers
filter for the URL on gateway and email servers, and block the creation of .SCR files on endpoint systems..."
-
http://www.symantec....-you-have-virus
September 10, 2010 - "...
the huge volume of traffic can actually take down servers...
1. Outbreak detection: Identify that an active outbreak is occurring because of the volume of traffic generated by the same malicious email
2. Internal mail filtering:
Block all internal traffic of the "
Here you Have" email* using Content Filtering
3. Mail store / inbox cleanup: Seek out and eliminate the "Here you Have" email from Mail Stores and end user inboxes..."
(Suggested add: "Just For you")
-
http://www.symantec....-you-have-virus
September 10, 2010 - "...
the huge volume of traffic can actually take down servers...
1. Outbreak detection: Identify that an active outbreak is occurring because of the volume of traffic generated by the same malicious email
2. Internal mail filtering:
Block all internal traffic of the "
Here you Have" email* using Content Filtering
3. Mail store / inbox cleanup: Seek out and eliminate the "Here you Have" email from Mail Stores and end user inboxes..."
(Suggested add: "Just For you")
-
http://www.symantec....m-here-you-have
September 9, 2010 - "... confirmed reports of a worm spreading through email under the subject "Here you have". The mail to the unsuspecting recipient claims to be providing a document available through a URL. The URL is spoofed and actually points to a malicious binary being hosted on a different server..."
-
http://community.web...g-as-a-PDF.aspx
10 Sep 2010 - "... When the user clicks and follows the link, a malicious file is downloaded, which further spreads the email campaign by pillaging the user's Outlook address book. This makes the attack more convincing as the source of the email could be legitimate and trusted..."
-
http://www.theregist...worm_spreading/
10 September 2010 - "... McAfee said multiple variants of the worm appear to be spreading, so it's not yet clear that the malicious screensaver is hosted by a single source."
-
http://www.symantec....eatconlearn.jsp
9/10/2010 - "The ThreatCon is currently at Level 3:
High. The ThreatCon has been raised to Level 3 due to increased activity. Symantec is observing a new threat spread through a socially engineered email attack. The email convinces the recipient to follow a link to open a malicious binary (disguised as a PDF)..."
-
http://www.virustota...04b7-1284133892
File name:
csrss.exe
Submission date: 2010-09-10 15:51:32 (UTC)
Result:
32 /43 (74.4%)
-
http://blogs.technet...rm-visal-b.aspx
10 Sep 2010 4:40 PM
-
http://www.microsoft...ges/visal-b.png
Charted - Sep. 10, 2010 18:59 GMT
Edited by AplusWebMaster, 11 September 2010 - 11:49 AM.