Description
Cisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain payment details for the recipient. The text in the e-mail message attempts to convince the recipient to open the attachment and view the details. However, the .rar attachment contains a malicious .exe file that, when executed, attempts to infect the system with malicious code.
E-mail messages that are related to this threat (RuleID5145) may contain the following files:
Payment TT Copy Slip.rar
worl_3.exe
The worl_3.exe file in the Payment TT Copy Slip.rar attachment has a file size of 421,411 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x0B14E288A849F29CFBE34EE257A2EE13
The following text is a sample of the e-mail message that is associated with this threat outbreak:
Subject: Re: Payment TT Copy .
Message Body:
Happy New Year 2013,
How are you,my name is Jamad Habib sorry for the late respond,I have just made
the 30% TT Payment for the PI you sent to us regarding our PO.
Kindly view the telex copy as attach in this email and write me when payment is
confirmed.
Thanks
Regards
Jamad Habib
Purchase Management Department
Al Jeab Trading Co UAE.
Source: Cisco