From: Interparcel [email@example.com]Attached is a randomly-named document that matches the reference in the email (e.g. Shipping Labels (620486055838).doc) of which I have seen two variants (VirusTotal results  ). These two Malwr reports   show Dridex-like download locations at:
Date: 17 March 2016 at 08:51
Subject: Interparcel Documents
Your Interparcel collection has been booked and your documents are ready.
There is a document attached to this email called Shipping Labels (620486055838).doc.
Please open and print this attachment and cut out the waybill images. They must be attached to your parcels before the driver arrives.
Thank you for booking with Interparcel.
The detection rate for the binary is 5/57. This DeepViz report on the binary shows network connections to:
184.108.40.206 (Culturegrid.nl, Netherlands)
220.127.116.11 (Level 3, US / Impsat, Argentina)
18.104.22.168 (FHU Climax Rafal Kraj, Poland)
22.214.171.124 (Hetzner / NoTaG Community, Germany)
As mentioned before, these characteristics look like the Dridex banking trojan.