From: Mary MathisThe sender's name, references and name of the attachment will vary, the attachment itself is named something similar to remittance_advice40502329.doc. So far I have seen two versions with detection rates of 3/54 [1] [2] and the Malwr reports [3] [4] indicate a download from the following locations:
Date: 19 January 2016 at 12:21
Subject: Remittance Advice For Invoice 40502329 From C-Tech
Dear Accounts
Please find attached our current remittance advice.
Kind Regards
Mary Mathis MAAT
Accounts Assistant
Tel: +44 (0)1903 268599
Fax: +44 (0)1903 795454
http://46.17.100.209/aleksei/smertin.php
http://31.131.20.217/aleksei/smertin.php
These IPs can be considered to be malicious and are allocated to:
46.17.100.209 (Mir Telematiki Ltd, Netherlands)
31.131.20.217 (PE Skurykhin Mukola Volodumurovuch, Ukraine)
The attack is very similar to this Dridex 120 spam run earlier today, except the download locations and dropped binary has changed to this one [VT] with an MD5 of c19959c2d372a7d40d4ba0f99745f114. According to this Malwr report, it phones home to the same evil IP address of 198.50.234.211 as before.
No comments:
Post a Comment