From lhc.reception@heart.org.uk
Date Tue, 28 Jul 2015 14:15:05 +0700
Subject Please Find Attached - Report form London Heart Centre
(See attached file: calaidzis, hermione.doc)
Attached is a file calaidzis, hermione.docm which comes in at least three different versions [1] [2] [3] which download a malicious binary from one of the following locations:
http://laperleblanche.fr/345/wrw.exe (94.23.1.145 / OVH, France)
http://chloedesign.fr/345/wrw.exe (85.236.156.24 / Barizco Inc., France)
http://ce-jeffdebruges.com/345/wrw.exe (94.23.1.145 / OVH, France)
This is saved as %TEMP%\treviof.exe and has a detection rate of 4/55. Automated analysis tools [1] [2] [3] report that it phones home to:
93.171.132.5 (PE Kartashev Anton Evgen'evich, Ukraine)
I recommend that you block that IP. The malware is the Dridex banking trojan.
MD5s:
5be14022a092eec9855e28c2498f5ada
04e3ab669c516b04f92a631aa1498ba9
550599ad64385497110f8bdb28164be2
5c8aa48a831675fa2b8e09821d37671a
No comments:
Post a Comment