From: Matthews, Tina [firstname.lastname@example.org]Running in parallel to this is another claiming to be from UK firm AquaAid which has been going on for a long time. In the first case the attachment is 20150326094147512.doc and in the second it is CAR015890001.doc, but they are the same malicious document.
Date: 9 April 2015 at 10:48
Subject: Credit card transaction
Here is the credit card transaction that you requested.
Royal Wholesale Electric
2801 East 208th Street
Carson, CA 90810
The document is currently undetected by AV vendors and contains a malicious macro [pastebin] which downloads a binary from:
This is saved as %TEMP%\ittext1.5.exe and has a VirusTotal detection rate of 3/49. Automated analysis tools     show traffic to the following IPs:
126.96.36.199 (Docker Ltd, Russia)
188.8.131.52 (Microtech Tel, US)
184.108.40.206 (Cadr-TV LLE TVRC, Ukraine)
220.127.116.11 (World Internetwork Corporation, Thailand)
18.104.22.168 (OneGbits, Lithuania)
22.214.171.124 (DigitalOcean Cloud, Singapore)
126.96.36.199 (University Of Chicago, US)
188.8.131.52 (Corgi Tech Limited, UK)
184.108.40.206 (Digital Ocean, UK)
220.127.116.11 (Digital Networks CJSC aka DINETHOSTING, Russia)
18.104.22.168 (Hutchison 3G, UK)
According to the Malwr report is also drops another variant of the downloader [VT 4/57] and a Dridex DLL [VT 4/57].