From: LogMeIn.com [firstname.lastname@example.org]Attached is a malicious Excel document called logmein_pro_receipt.xls with a VirusTotal detection rate of 0/56. Usually in a spam run like this there are several different versions of the document but so far I have only seen one, containing this malicious macro. The macro downloads a file from:
Date: 25 February 2015 at 08:52
Subject: Your LogMeIn Pro payment has been processed!
Thank you for purchasing our yearly plan for LogMeIn Pro on 25 computers.
Your credit card has been successfully charged.
Date : 25/2/2015
Amount : $999 ( you saved $749.75)
The transaction details can be found in the attached receipt.
Your computers will be automatically upgraded the next time you sign in.
Thank you for choosing LogMeIn!
This is saved as %TEMP%\GHjkdfg.exe and has a VirusTotal detection rate of 3/57. Automated analysis tools    show this calling home to the following IPs:
220.127.116.11 (MTWV, Latvia)
18.104.22.168 (One Telecom, Moldova)
22.214.171.124 (ITL, Bulgaria)
126.96.36.199 (Choopa LLC, Netherlands)
188.8.131.52 (OVH, Ireland)
184.108.40.206 (Microtech Tel, US)
220.127.116.11 (World Internetwork Corporation, Thailand)
18.104.22.168 (Digital Networks aka DINETHOSTING, Russia)
22.214.171.124 (Broadband Multiplay, India)
126.96.36.199 (Webazilla, US)
188.8.131.52 (Colo at 55, US / UA Servers, Ukraine)
I outlined some of the problems with MVTW in this post. The Malwr report shows that among other activities, this drops an executable that seems to be another version of itself [VT 3/57] and a malicious DLL which is probably a Dridex component [VT 4/57].
UPDATE: a different version of the attachment [VT] uses this macro to download from:
The payload is identical to the other variant.