Sponsored by..

Monday 7 November 2016

Malware spam: "Financial documents" leads to Locky

The never-ending Locky ransomware onslaught continues. This fake financial spam has a malicious attachment:

Subject:     Financial documents
From:     Judy Herman
To:     [redacted]
Date:     Monday, 7 November 2016, 10:53

Hi [redacted],

These financial documents need to be uploaded on the system.
Please let me know if you experience any technical problems.

Best Wishes,
Judy Herman 
Sender names will probably vary. In the sample I saw there was an attachment named fin_docs_f73856f4.zip containing a malicious script NRV_A194008F_.vbs that looks like this. This particular script (and there will be others like it) attempts to download from:


According to this Hybrid Analysis, the malware then phones home to: [hostname: panteleev.zomro.com] (Layer6 Networks, Bulgaria / ITLDC, Latvia) [hostname: endgo.ru] (Hostpro Ltd. / hostpro.com.ua, Ukraine) (Knopp, Russia)

Recommended blocklist:

No comments: