From: BBB Accreditation Services [email@example.com]
Date: Thu, 12 Feb 2015 10:50:01 +0000
Subject: BBB SBQ Form
Thank you for supporting your Better Business Bureau (BBB).
As a service to BBB Accredited Businesses, we try to ensure that the information we provide to potential customers is as accurate as possible. In order for us to provide the correct information to the public, we ask that you review the information that we have on file for your company.
We encourage you to print this SBQ Form, answer the questions and respond to us. (Adobe PDF)
Please look carefully at your telephone and fax numbers on this sheet, and let us know any and all numbers used for your business (including 800, 900, rollover, and remote call forwarding). Our automated system is driven by telephone/fax numbers, so having accurate information is critical for consumers to find information about your business easily.
Thank you again for your support, and we look forward to receiving this updated information.
Attached is a file SQB Form.zip which contains a malicious executable SQB Form.exe. This has a VirusTotal detection rate of 4/57. Automated analysis tools     show that attempts to connect to these following legitimate IPs and domains to determine the IP address and current time:
Of these, checkip.dyndns.org is worth monitoring as it is often an indicator of infection.
The Anubis report also shows a DNS query to semiyun.com on 188.8.131.52 (Netinternet, Turkey). Also the Malwr report shows connections to the following URLs:
Of these, 184.108.40.206 (Ukrainian High Technologies Ltd, Ukraine) looks like the C&C server and this should definitely be blocked.
A file jeoQxZ5.exe is also dropped with a detection rate of 6/57. This is most likely the Dyre banking trojan. Samples can be found here, password is infected.