From: Credit Control [cc@pentafoods.com]Attached is a document I0026098.doc which comes in at least two versions with low detection rates [1] [2] which contain some macros [1] [2] that attempt to download a component from the following locations:
Date: 5 March 2015 at 11:10
Subject: Penta invoice I0026098
Please find attached your invoice I0026098
Regards,
Finance Team
http://maloja.se/js/bin.exe
http://campusnut.com/js/bin.exe
This is the same payload as used in this earlier spam run. It currently has a VirusTotal detection rate of 12/56.
This comment has been removed by the author.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteBlogger Nancy said...
ReplyDeleteI received one of these emails, and not thinking, opened the attachment, ugh! Can you tell me what they can see/get off my phone? Is there anything I can do to remove whatever may have been put on?