MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “ADP: August 22, 2014 Anti-Fraud Secure Update” and “Payroll Received by Intuit” that contains the same trojan but is present in two types of emails.
ADP: August 22, 2014 Anti-Fraud Secure Update
This email is send from the spoofed address “ADP_Netsecure@adp.com” <ADP_Netsecure@adp.com>”, the SMTP from address is “AmericanExpress@welcome.aexp.com” and has the following body:
2014 Anti-Fraud Secure Update
Dear Valued ADP Client,
We are pleased to announce that ADP Payroll System released secure upgrades to your computer.
A new version of secure update is available.
Our development division strongly recommends you to download this software update.
It contains new features:
The certificate will be attached to the computer of the account holder, which disables any fraud activity
Any irregular activity on your account is detected by our safety centre
Download the attachment. Update will be automatically installed by double click.
We value our partnership with you and take pride in the confidence that you place in us to process payroll
on your behalf. As always, your ADP Service Team is happy to assist with any questions you may have.
Here’s a screenshot of the email in question:
The attached ZIP file has the name 2014 Anti-Fraud Secure Update_08222014.zip and contains the 19 kB large file 2014 Anti-Fraud Secure Update_08222014.scr.
Payroll Received by Intuit
This email is send from the spoofed address Intuit Payroll Services <IntuitPayrollServices@payrollservices.intuit.com>, the SMTP from address is “AmericanExpress@welcome.aexp.com” and has the following body:
We received your payroll on August 22, 2014 at 09:06 AM EST.
Attached is a copy of your Remittance. Please click on the attachment in order to view it.
Please note the deadlines and status instructions below:
If your payroll is received BEFORE 5 p.m., your Direct Deposit employees will be paid two (2) banking days from the date received or on your paycheck date, whichever is later.
If your payroll is received AFTER 5 p.m., your employees will be paid three (3) banking days from the date received or on your paycheck date, whichever is later.
YOUR BANK ACCOUNT WILL BE DEBITED THE DAY BEFORE YOUR CHECKDATE.
Funds are typically withdrawn before normal banking hours so please make sure you have sufficient funds available by 12 a.m. on the date funds are to be withdrawn.
Intuit must receive your payroll by 5 p.m., two banking days before your paycheck date or your employees will not be paid on time.
Intuit does not process payrolls on weekends or federal banking holidays. A list of federal banking holidays can be viewed at the Federal Reserve website.
Thank you for your business.
Intuit Payroll Services
IMPORTANT NOTICE: This notification is being sent to inform you of a critical matter concerning your current service, software, or billing. Please note that if you previously opted out of receiving marketing materials from Intuit, you may continue to receive notifications similar to this communication that affect your service or software.
If you have any questions or comments about this email, please DO NOT REPLY to this email. If you need additional information please contact us.
If you receive an email message that appears to come from Intuit but that you suspect is a phishing email, please forward it to immediately to firstname.lastname@example.org.
© 2014 Intuit Inc. All rights reserved. Intuit and the Intuit Logo are registered trademarks and/or registered service marks of Intuit Inc. in the United States and other countries. All other marks are the property of their respective owners, should be treated as such, and may be registered in various jurisdictions.
Intuit Inc. Customer Communications
2800 E. Commerce Center Place, Tucson, AZ 85706
The attached ZIP file has the name payroll_report_08212014.zip and contains the 19 kB large file payroll_report_08212014.exe.
The trojan is known as Trojan.Win32.Upatre.CAA, W32/Trojan.EVMP-6983, TrojanDownloader:Win32/Upatre.AA or HEUR/Malware.QVM20.Gen.
At the time of writing, 5 of the 54 AV engines did detect the trojan at Virus Total.
Use the Virus Total permalink for more detailed information.