Subject: Message from KONICA_MINOLTAThe spam appears to come from within the victim's own domain, from one of the following email addresses:
Subject: Message from MFD
Subject: Message from scanner
MFD@victimdomain.tldThis is just a simple forgery. It doesn't mean that you organisation has been compromised.. it really is a very simple trick. In all cases the attachment is named SKM_4050151222162800.doc, which appears to come in three versions (VirusTotal [1] [2] [3]). The Malwr reports [4] [5] [6] indicate executable download locations at:
scanner@victimdomain.tld
KONICA_MINOLTA@victimdomain.tld
www.showtown-danceband.de/ghf56sgu/0976gg.exe
ausonia-feng-shui.de/ghf56sgu/0976gg.exe
gahal.cz/ghf56sgu/0976gg.exe
This binary has a detection rate of 1/54 and that VirusTotal report plus this Malwr report show it phoning home to:
192.241.207.251 (Digital Ocean Inc., US)
I strongly recommend that you block traffic to that IP. The payload is the Dridex banking trojan, sent by botnet 220.
3 comments:
Great, thanks, received just this morning.
Me too, from "scanner@hotmail".
Yeah me to but to my google account
I was downloaded the zip file but when i see the type of file is " .js " this's to wierd for me after that i blocked quickly
Post a Comment