FYI...
Fake 'SEPA' SPAM - malware attachment
- http://myonlinesecur...ayment-malware/
6 May 2015 - "'Urgent notice about your SEPA Payment' coming from random names and email addresses with a zip attachment is another one from the current bot runs... The email looks like:
The SWIFT transaction, recently initiated from your company”s online banking account, was aborted by the Electronic Payments Association.
Aborted transfer
SWIFT Processing Case ID G10536592
Transaction Amount 38058.65 Pounds sterling
E-mail info@thespykiller .co .uk
Reason of rejection View details
Please click the address given at the top to see the statement with all details about this case.
-or-
The online transaction, recently sent from your company”s checking account, was cancelled by the other financial institution.
Rejected transfer
Transaction Case ID R89716531
Total 21696.96 GBP
Billing E-mail amy@hedgehoghelp .co .uk
Reason for rejection View details
Please click the address you can find above to open the MS Word document with the full info about this problem.
There are dozens if not -hundreds- of different -dropbox- links with this series of spam emails. It is very likely that each one will have a different sha256# so the detections on VirusTotal might well be incorrect.
6 May 2015: online Payment6688.zip : Extracts to: Rejected SWIFT Transaction.doc Word Document_86535.scr Current Virus total detections: 2/55* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper word doc instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1430902669/
___
Fake 'Invoice 37333' SPAM – doc/xls malware
- http://myonlinesecur...dsheet-malware/
6 May 2015 - "'Invoice 37333 from CONTRACT SECURITY SERVICES LIMITED' pretending to come from accounts3 <accounts3@ contractsecurity .co .uk> with a malicious word doc or Excel XLS spreadsheet attachment is another one from the current bot runs...
Screenshot: http://myonlinesecur...CES-LIMITED.png
6 May 2015 : Inv_37333_from_CONTRACT_SECURITY_SERVICES_LTD_3000.doc
Current Virus total detections: 2/57* ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1430904557/
___
Fake 'Check your requisite' SPAM – PDF malware
- http://myonlinesecur...ke-pdf-malware/
6 May 2015 - "'Check your requisite' coming from random names and email addresses with a zip attachment is another one from the current bot runs... The email looks like:
Good morning
Could You please check your requisite details under the contract #4HZKYN
The contract number in the body of the email matches the zip attachment name.
6 May 2015: QmXFW4.zip: Extracts to: invalidation_invoice_report.exe
Current Virus total detections: 2/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1430906359/
... Behavioural information
TCP connections
166.78.246.145: https://www.virustot...45/information/
91.211.17.201: https://www.virustot...01/information/
184.164.97.239: https://www.virustot...39/information/
90.84.60.97: https://www.virustot...97/information/
UDP communications
23.99.222.162: https://www.virustot...62/information/
___
Fake 'Transport' SPAM – doc/xls malware
- http://myonlinesecur...dsheet-malware/
6 May 2015 - "Email from 'Transport for London' pretending to come from noresponse@ cclondon .com with a malicious word doc or Excel XLS spreadsheet attachment is another one from the current bot runs...
Screenshot: http://myonlinesecur...-for-London.png
6 May 2015 : AP0210780545.doc - Current Virus total detections: 2/57*
... which downloads from volpefurniture .com/111/46.exe (VirusTotal**)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1430908758/
** https://www.virustot...sis/1430909515/
... Behavioural information
TCP connections
62.152.36.90: https://www.virustot...90/information/
90.84.60.97: https://www.virustot...97/information/
volpefurniture .com: 192.254.142.34: https://www.virustot...34/information/
- http://blog.dynamoo....nsport-for.html
6 May 2015
... Recommended blocklist:
62.152.36.90
89.28.83.228
185.12.95.191
185.15.185.201 ..."
___
ADP Invoice Spam
- http://threattrack.t...dp-invoice-spam
May 6, 2015 - "Subjects Seen:
ADP invoice for week ending 05/06/2015
Typical e-mail details:
Your most recent ADP invoice is attached for your review.
If you have any questions regarding this invoice, please contact your ADP service team at the number provided on the invoice for assistance.
Please note that your bank account will be debited within one banking business day for the amount(s) shown on the invoice.
Thank you for choosing ADP for your business solutions.
Important: Please do not respond to this message. It comes from an unattended mailbox.
Malicious File Name and MD5:
invoice_400119471.exe (222ddd63ab85f03ff344c4328e58896c)
Tagged: ADP, Upatre
___
IRS e-Help Desk Spam
- http://threattrack.t...-help-desk-spam
May 6, 2015 - "Subjects Seen:
E-mail Receipt Confirmation - Ticket#SD0180867
Typical e-mail details:
The IRS e-help Desk has received your email on 05/06/15. A case has been opened in response to your question or issue.
Your case ID is : SD0180867
Details about this case has been attached.
If additional contact is necessary, please reference this case ID.
You will receive a reply within two business days.
Thank you for contacting the IRS e-help Desk.
Malicious File Name and MD5:
SD743299.exe (222ddd63ab85f03ff344c4328e58896c)
Tagged: IRS, Upatre
Edited by AplusWebMaster, 06 May 2015 - 02:01 PM.