From: Amazon.co.uk [payments-messages@amazon.co.uk]
Reply-To: "Amazon.co.uk" [payments-messages@amazon.co.uk]
Date: 23 April 2015 at 09:58
Subject: Refund on order 204-2374256-3787503
Dear Customer,
Greetings from Amazon.co.uk.
We are writing to confirm that we are processing your refund in the amount of £4.89 for your
Order 204-2374256-3787503.
This amount has been credited to your payment method and will appear when your bank has processed it.
This refund is for the following item(s):
Item: Beautiful Bitch
Quantity: 1
ASIN: 1476754144
Reason for refund: Customer return
The following is the breakdown of your refund for this item:
Item Refund: £4.89
Your refund is being credited as follows:
GC: £4.89
These amounts will be returned to your payment methods within 5 business days.
The amount credited to your Gift Card balance should be automatically applied to your next eligible
order on our website.
Have an issue with your refund, or a question about our refund policy?
Visit our Help section for more information:
http://www.amazon.co.uk/gp/help/customer/display.html?nodeId=1161010
Please note: The credit note for this transaction is attached to this e-mail and to open, you will
need Adobe Reader. If you do not have an Adobe Reader, please visit the following link to download
it: http://get.adobe.com/reader/
This credit note is the detailed breakdown of the refund showing the item(s), delivery costs and
associated VAT for each item. This credit note is largely applicable to business customers who
should retain it for accounting purposes. It’s not possible to redeem or use the credit
note number from this credit note towards an order. Visit our Help pages for more information on
refunds.
Thank you for shopping at Amazon.co.uk.
Sincerely,
Amazon.co.uk Customer Service
http://www.amazon.co.uk
Note: this e-mail was sent from a notification-only e-mail address that cannot accept incoming e-mail.
Please do not reply to this message.
An advanced electronic signature has been attached to this electronic credit note. To add the certificate
as a trusted certificate, please follow these instructions:
1. Click on the 'Signature Panel' in the upper right corner
2. Expand the drop-down in the newly opened Signatures menu, expand the 'Signature Details' drop-down and
click 'Certificate Details'
3. In the Certificate Viewer box click on the 'Trust' tab, click 'Add To Trusted Certificates' and then
click OK
4. In the Import Contact Settings box, ensure that 'Use this certificate as a trusted root' is selected,
click OK, and then click OK again
Attached is a file 204-2374256-3787503-credit-note.doc which probably comes in several versions, however the one I analysed had a detection rate of 4/57 and contained this malicious macro [pastebin] which downloads a component from:
http://qube.co.il/42/335.exe
..which is saved as %TEMP%\pierre3.exe and which currently has a detection rate of 3/42 (42?). Automated analysis tools [1] [2] [3] [4] indicate that it calls out to the following IPs:
185.12.95.191 (RuWeb CJSC, Russia)
87.236.215.151 (OneGbits, Lithuania)
94.23.171.198 (OVH, Czech Republic)
185.35.77.250 (Corgi Tech, UK)
149.154.64.70 (TheFirst-RU, Russia)
The Malwr report says that it drops a Dridex DLL which currently has a detection rate of 17/56.
Recommended blocklist:
185.12.95.191
87.236.215.151
94.23.171.198
185.35.77.250
149.154.64.70
MD5s:
e52a8d15ee08d7f8b4efca1b16daaefb
57b54e248588af284871c2076f05651c
ca5c5b79ce16d888ba2a6747b9d033d3