Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Threat Outbreak Alert: Fake Purchase Order List E-mail Messages

$
0
0

Description

Cisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain purchase order information for the recipient. The text in the e-mail message attempts to persuade the recipient to open the .zip attachment and view the details. However, the .zip attachment contains a malicious .scr file that, when executed, attempts to infect the system with malicious code.

E-mail messages that are related to this threat (RuleID4983KVR) may contain the following files:
New Year Order.zip
New Year Order.scr

The New Year Order.scr file in the New Year Order.zip attachment has a file size of 311,808 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0xF5D72505425B665C0C880706200BDBCC

The following text is a sample of the e-mail message that is associated with this threat outbreak:
Subject: IRON EXE_Attachment _

Message Body:

Hello,
Hope you had a pleasant xmas. I wish you and your team a prosperous
2013 ahead.
I have attached the signed purchase order list. Please confirm same so
we could expedite action on the process.
Please review and send us the PI to enable us make payment.
Thank you,
Von Sherra
Supervisor/Purchasing

Source: Cisco

Viewing all articles
Browse latest Browse all 8064

Trending Articles