Thursday, 29 October 2015

Heather Crawford Your Invoice I0000040777.doc

Description:


Heather Crawford Your Invoice I0000040777.doc macro malware.

Headers:

From: "Heather Crawford" {h.crawford@barclaycomms.com}
Subject: Your Invoice I0000040777

Message Body:

Dear Customer. Please find attached your Invoice.

Invoice Number: 0000040777

Invoice Date: 28/10/2015

Invoice Total: 78.40

Invoice Description: Barclay Fresh Direct Debit 1 V (x1.00000)

This e-mail, and any attachment, is confidential. If you have received it in error, please delete it from your system, do not use or disclose the information in any way, and notify me immediately. The contents of this message may contain personal views which are not the views of Barclay Communications, unless specifically stated.

Attachment filenames:

I0000040777.doc

Sha256 Hashes:

b6a1c2e867e62cbdf614de7fa5f25d75789dd67efaad860bf657ce780818c232 [1]
044ea5d5039e561c57a4b88bff5949d5640a26fcb2f1d6cd1b663c36e3e010bb [2]
8f8bbc433b58ca1440943b640f35cb15d3e3e011e11377fb48c7f414ce5357e6 [3]
9ce753830ba981debb6aad08bf1564acce910607848687b99ac3b3c3657a0b75 [4]
a793aef1bbcdef406c90a4166cc5a42032c703aaf485b00027c24a63dee602af [5]

Malware Virus Scanner Reports:

VirusTotal Report: [1] (detection 3/56)
VirusTotal Report: [2] (detection 3/56)
VirusTotal Report: [3] (detection 3/56)
VirusTotal Report: [4] (detection 3/56)
VirusTotal Report: [5] (detection 3/56)

Sanesecurity Signature detection:

badmacro.ndb: Sanesecurity.Badmacro.Xls.Wshell.G

Important notes:

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android mobiles/tablets can open these attachments and may even manage to run the macro embedded inside the attachment but they will be safe

The auto-downloaded/payloadis normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

These word/excel attachments normally try to download either...

    Dridex banking trojan,
    Shifu banking trojan

... both of which are designed to steal login information regarding your bank accounts either by key logging, taking screen shots or copying information directly from your clipboard (copy/paste)


It's also worth remembering that the company itself  may not have any knowledge of this email and any link(s) or attachment in the email. normally won't have come from their servers or IT systems but from an external bot net.

These bot-net emails normally have faked email headers/addresses. It's not advised to ring the the company themselves, as there won't really be anything they can do to help you.



Cheers,
Steve

No comments: