Fake emails “ADP: August 22, 2014 Anti-Fraud Secure Update” contains Upatre downloader


MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “ADP: August 22, 2014 Anti-Fraud Secure Update” and “Payroll Received by Intuit” that contains the same trojan but is present in two types of emails.

ADP: August 22, 2014 Anti-Fraud Secure Update

This email is send from the spoofed address “ADP_Netsecure@adp.com” <ADP_Netsecure@adp.com>”, the SMTP from address is “AmericanExpress@welcome.aexp.com” and has the following body:

ALERT!

2014 Anti-Fraud Secure Update

Dear Valued ADP Client,

We are pleased to announce that ADP Payroll System released secure upgrades to your computer.

A new version of secure update is available.

Our development division strongly recommends you to download this software update.

It contains new features:

The certificate will be attached to the computer of the account holder, which disables any fraud activity
Any irregular activity on your account is detected by our safety centre
Download the attachment. Update will be automatically installed by double click.

We value our partnership with you and take pride in the confidence that you place in us to process payroll
on your behalf. As always, your ADP Service Team is happy to assist with any questions you may have.

Here’s a screenshot of the email in question:

The attached ZIP file has the name 2014 Anti-Fraud Secure Update_08222014.zip and contains the 19 kB large file 2014 Anti-Fraud Secure Update_08222014.scr.

Payroll Received by Intuit

This email is send from the spoofed address Intuit Payroll Services <IntuitPayrollServices@payrollservices.intuit.com>, the SMTP from address is “AmericanExpress@welcome.aexp.com” and has the following body:

Dear, admin
We received your payroll on August 22, 2014 at 09:06 AM EST.

Attached is a copy of your Remittance. Please click on the attachment in order to view it.

Please note the deadlines and status instructions below:
If your payroll is received BEFORE 5 p.m., your Direct Deposit employees will be paid two (2) banking days from the date received or on your paycheck date, whichever is later.
If your payroll is received AFTER 5 p.m., your employees will be paid three (3) banking days from the date received or on your paycheck date, whichever is later.

YOUR BANK ACCOUNT WILL BE DEBITED THE DAY BEFORE YOUR CHECKDATE.
Funds are typically withdrawn before normal banking hours so please make sure you have sufficient funds available by 12 a.m. on the date funds are to be withdrawn.
Intuit must receive your payroll by 5 p.m., two banking days before your paycheck date or your employees will not be paid on time.
Intuit does not process payrolls on weekends or federal banking holidays. A list of federal banking holidays can be viewed at the Federal Reserve website.
Thank you for your business.

Sincerely,

Intuit Payroll Services

IMPORTANT NOTICE: This notification is being sent to inform you of a critical matter concerning your current service, software, or billing. Please note that if you previously opted out of receiving marketing materials from Intuit, you may continue to receive notifications similar to this communication that affect your service or software.
If you have any questions or comments about this email, please DO NOT REPLY to this email. If you need additional information please contact us.

If you receive an email message that appears to come from Intuit but that you suspect is a phishing email, please forward it to immediately to spoof@intuit.com.
© 2014 Intuit Inc. All rights reserved. Intuit and the Intuit Logo are registered trademarks and/or registered service marks of Intuit Inc. in the United States and other countries. All other marks are the property of their respective owners, should be treated as such, and may be registered in various jurisdictions.

Intuit Inc. Customer Communications
2800 E. Commerce Center Place, Tucson, AZ 85706

 

The attached ZIP file has the name payroll_report_08212014.zip and contains the 19 kB large file payroll_report_08212014.exe.

The trojan is known as Trojan.Win32.Upatre.CAA, W32/Trojan.EVMP-6983, TrojanDownloader:Win32/Upatre.AA or HEUR/Malware.QVM20.Gen.

At the time of writing, 5 of the 54 AV engines did detect the trojan at Virus Total.

Use the Virus Total permalink for more detailed information.
SHA256: 81e695f628436a4850bec46b3f90906433a0d11ae163f298f48fae788362d29a

New offer MX Lab AVAS for ISPs and Webhosters


MX Lab, http://www.mxlab.eu, started has reviewed its offer towards ISPs and webhosters and can now offer a real good solution.

MX Lab AVAS for ISPs/Webhosters

MX Lab AVAS for ISPs includes: zero hour anti virus and managed anti spam as a standard on a domain level.

MX Lab AVAS for ISPs Premium

MX Lab AVAS for ISPs Premium offers ISPs the best flexibility and most custom set up that you can afford. Define your needs and MX Lab will set up the necessary platform for you to start protecting your clients straight away. Pricing starts from € 190 per month for 2 servers (1 gateway and 1 AVAS MTA Inbound).

For more information and pricing contact MX Lab or visit our web site

Email “inovice_AUG_9693495.pdf” contains malicious PDF file


MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “inovice_AUG_9693495.pdf”.

This email is send from the spoofed addresses and has the following short body:

This email contains an invoice file attachment

Attached is a 16 kB what appears to be a blank PDF file with the file name inovice_AUG_9693495.pdf but in fact contains a potential risk when opened.

Note that the numbers in the subject and filenames vary.

The threath is known as  Exploit/CVE-2013-2729, HEUR:Exploit.PDF.Generic, Artemis!89839FA52903 or NORMAL:Hack.Exploit.MalPDF.a!1609222.

At the time of writing, 6 of the 50 AV engines did detect the trojan at Virus Total.

Use the Virus Total permalink for more detailed information.
SHA256: 10f0734ccfefc2db770f2aa1fc4d9e86a81c759a56d4387a146b1c2ad81494a8

Email “My new photo” contains a variant of Win32/Injector.BKLN trojan


MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “My new  photo”.

This email is send from the spoofed addresses and has the following short body in very poor English:

my new photo ;)
if you like my photo to send me u photo

The attached ZIP file has the name photo.zip, once extracted a folder photo is available with that contains the 90 kB large file photo.exe.

The trojan is known as a variant of Win32/Injector.BKLN, Virus.Win32.Heur.p, W32/Trojan.UGXI-1638, W32/Trojan3.KEU,  Dropper-FLK!A669913F1AB3 or Spyware.Zbot.ED.

At the time of writing, 6 of the 52 AV engines did detect the trojan at Virus Total.

Use the Virus Total permalink for more detailed information.
SHA256: ca610a6f3e9a865c787743d05377ab419183fa0dcc2b8aeb0294ae6ff4449314.

Fake email from VOIP Inc installs trojan downloader using Word macro script


MX Lab, http://www.mxlab.eu, started to intercept a campaign by email with the subject “Your Order No 355253536 | Mob Inc.” which includes a malicious Word document that allows the installation of a trojan downloader using the macro functionality from Word.

This email is send from the spoofed addresses and has the following body:

Thank you for ordering from VOIP Inc.

This message is to inform you that your order has been received and is currently being processed.

Your order reference is 488910845598.
You will need this in all correspondence.
This receipt is NOT proof of purchase.
We will send a printed invoice by mail to your billing address.

You have chosen to pay by credit card. Your card will be charged for the amount
of 805.74 USD and “VOIP Inc.”
will appear next to the charge on your statement.
Your purchase information appears below in the file.

The attached ZIP file has the name Order.zip and contains the 41 kB large file Order.Doc.

The Order.Dos is a genuine Word document but the file contains a malicious macro features. Once opening the Word document, instructions are given on how to enable the content and activate the malicious macro script.

View the contents of the document

SHAPE  \* MERGEFORMAT

For Microsoft Office 2013
To view the contents of the document, click on “Enable Content” on

For Microsoft Office 2010
To view the contents of the document, click on “Enable Content” on

For Microsoft Office 2007

1.Um display the contents of the document, click the Options
2 Then select “Display the content” and click “OK”

For Microsoft Office 2003
1 In the menu “Tools” click on “Macro” and then click “Security”.
2 Select “Low” and click “OK”.

Watch out! The set showed the document was created in a newer version of Microsoft Office ™.
For the display of the contents of this document you should activate the macro.

The downloader is known as W97M/Downloader, MO97:Downloader-DU, VBA/TrojanDownloader.Agent.AL, Trojan-Downloader:W32/Agent.DVCR, Trojan-Downloader.VBA.Agent or Trojan.Mdropper.

At the time of writing, 8 of the 53 AV engines did detect the trojan downloader at Virus Total.

Use the Virus Total permalink and Malwr permalink for more detailed information.
SHA256: af8694825d3d7eb470255b9dd858e6544ac54df9295bb373bc8205e8fe27722c

Fake email “Transaction completed” from Barclays contains Trojan.Ransom.ED


MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “Your transaction is completed”.

This email is send from the spoofed address “Barclays.NET” <support@barclays.net>” and has the following body:

Transaction is completed. 8678 GBP has been successfully transfered.
If the transaction was made by mistake please contact our customer service.
Payment receipt is attached.
*** This is an automatically generated email, please do not reply ***
Barclays.Net 2013 Corporation. All rights reserved.

The attached ZIP file has the name Payment receipt 1534465.zip and contains the 70 kB large file Payment receipt 8821991.exe (note: file name may vary with each email).

The trojan is known as Trojan.Ransom.ED or Mal/Generic-S.

At the time of writing, 2 of the 54 engines did detect the trojan at Virus Total.

Use the Virus Total permalink for more detailed information.
SHA256: baa52d35dd98c788729f661c9c9d7b4053fcbdb3083943b9d517b83fe38063a6

Fake Charity Trends email regarding donation contains trojan


MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “Thank you for your generous donation! Charity Trends .”.

This email is send from the spoofed address and has the following body:

Charity Trends®

Dear *******@*******.com,

Thank you for your generous donation of 2623 GBP, which we received today.

Your generosity will make an immediate difference in the lives of many people who need your help. The funds raised will go toward them.

You will find all information about your donation in zip archive.You are making a difference!

Thanks again for your kindness,

Elsa Nash .

We’re happy to help you with any questions or concerns you may have. Please contact us directly 24/7 via hxxp://www.charitytrends.org/ContactUs.aspx

The attached ZIP file has the name DON_9683272_90.zip and contains the folder DON_4356984_08_14_14. Indside this folder, the 102 kB large file DON_4356_45984_08_14_14.scr will be found.

Please note that the subject line and attachment file names may change with each message.

The trojan is known as Trojan/Win32.Zbot, Win32:Malware-gen, HEUR/Malware.QVM20.Gen  or Mal/Generic-S.

At the time of writing, 4 of the 54 AV engines did detect the trojan at Virus Total.

Use the Virus Total permalink for more detailed information.
SHA256: 3158101b5a61094a960bc3e4a17240c153efa8cbb6b1eaa26e6d2ab6c06cafe9

Follow

Get every new post delivered to your Inbox.

Join 314 other followers