From [accounts_do_not_reply@aldridgesecurity.co.uk]I have only seen a single sample with an attachment document2016-02-09-103153.doc which has a VirusTotal detection rate of 5/54. Automated analysis [1] [2] shows that it downloads a malicious executable from:
Date Tue, 09 Feb 2016 10:31:14 +0200
Subject
Accounts
promo.clickencer.com/4wde34f/4gevfdg
This has a detection rate of 5/54. Those analyses indicates that the malware phones home to:
50.56.184.194 (Rackspace, US)
I strongly recommend that you block traffic to that IP. The payload is the Dridex banking trojan.
No comments:
Post a Comment