From: admin [admin@victimdomain.tld]I have seen just a single sample with a document named DOC201114-201114-001.DOC which has a detection rate of 4/53 and which according to this Malwr report downloads from:
Date: 19 January 2016 at 09:42
Subject: More scans
www.cnbhgy.com/786585d/08g7g6r56r.exe
This download location was used in this earlier spam run but the payload has now changed, however it is still the Dridex banking trojan.
Could you find out the reason for sending the e-mail? I received yesterday in my domain the same mail.
ReplyDeleteThanks for this. Received same email this morning and presumed my website had been hacked.
ReplyDeleteI have been receiving numerous emails like this, accidentally opened one of the attachments on my iOS mobile.
ReplyDeleteany ideas on what to do next?
@pristine - this impacts Windows-based PCs only, your iPhone thingie should be OK>
ReplyDelete