From: Credit Control [cc@pentafoods.com]Attached is a document I0026098.doc which comes in at least two versions with low detection rates [1] [2] which contain some macros [1] [2] that attempt to download a component from the following locations:
Date: 5 March 2015 at 11:10
Subject: Penta invoice I0026098
Please find attached your invoice I0026098
Regards,
Finance Team
http://maloja.se/js/bin.exe
http://campusnut.com/js/bin.exe
This is the same payload as used in this earlier spam run. It currently has a VirusTotal detection rate of 12/56.
3 comments:
Blogger Nancy said...
I received one of these emails, and not thinking, opened the attachment, ugh! Can you tell me what they can see/get off my phone? Is there anything I can do to remove whatever may have been put on?
Post a Comment