From: email@example.comAttached is a file 30.03.15 Ebola Virus (2).doc which contains this malicious macro [pastebin] which is contains a lot of girls names as variables (which makes a nice change from the randomly-generated stuff I suppose).
Date: 7 April 2015 at 08:58
Subject: EBOLA INFORMATION
This email is generated from an unmanned mailbox. Dr N J Gaw can be contacted via firstname.lastname@example.org
PLEASE SEE THE ATTACHED CORRESPONDENCE FOR YOUR INFORMATION.
When decoded the macro downloads a component from:
VirusTotal submissions seem to be down at the moment, so I can't tell you what the detection rate is. Automated analysis tools    show it phoning home to the following IPs (ones in bold are most likely static, the others look to be dynamic):
220.127.116.11 (Reg.Ru Hosting, Russia)
18.104.22.168 (Aqua Networks Ltd, Germany)
22.214.171.124 (Goteborgs Universitet, Sweden)
126.96.36.199 (Digital Ocean Inc, UK)
188.8.131.52 (ABTS, India)
184.108.40.206 (O.M.C. Computers & Communications Ltd, Israel)
220.127.116.11 (Satnet Ltd, Bulgaria)
18.104.22.168 (BT Broadband, UK)
22.214.171.124 (Multimedia Polska S. A., Poland)
126.96.36.199 (Multimedia Polska S. A., Poland)
According to the Malwr report it drops a whole load of files including what is probably a Dridex DLL.