Sponsored by..

Wednesday 30 March 2016

Malware spam: "Additional Information Needed #869420" leads to ransomware

This spam has a malicious attachment, leading to ransomware.

From:    Joe holdman [holdmanJoe08@seosomerset.co.uk]
Date:    30 March 2016 at 08:55
Subject:    RE: Additional Information Needed #869420

We kindly ask you to provide us additional information regarding your case.
Please find the form attached down below.
The reference number varies in the subject. The attachment is a ZIP file containing elements of the recipients email address and words like "copy" or "invoices" plus a random number. These unzip into a folder called "letter" to give a .js file beginning with "letter_" and a .wrn file which also appears to be a script but which won't run by default.

An analysis of three scripts [1] [2] [3] shows binary downloads from:


This binary has a detection rate of 6/56.  Automated analysis [4] [5] shows network traffic to: (Krek Ltd, Russia) (OVH, France / Bondhost, Montenegro) (TheFirst-RU, Russia)

These characteristics are consistent with Locky ransomware.

Recommended blocklist:

1 comment:

PC.Tech said...

- https://atlas.arbor.net/briefs/index#-318909613
"... At the present, Locky developers are completely reliant upon some level of user interaction. Educating your workforce on potential threats and the overall threat vectors is still the best way to inhibit threats like Locky."