From: Mirjana Prgomet [firstname.lastname@example.org]There is no body text, but the only example I saw had an attachment name of report20520159260.doc which contained this malicious macro [pastebin] which downloads a malicious executable from:
Date: 20 May 2015 at 08:26
Subject: Uplata po pon 43421
This is saved as %TEMP%\eldshrt1.exe and has a VirusTotal detection rate of 3/56. There are probably other download locations with other variants of the document, but the payload should be the same in each case.
Automated analysis tools    indicate network traffic to the following locations:
184.108.40.206 (Selectel Network, Russia)
220.127.116.11 (Digital Ocean, US)
18.104.22.168 (Digital Ocean, Netherlands)
22.214.171.124 (Hetzner, Germany)
The Malwr report shows that it drops a Dridex DLL with a detection rate of 5/53.