Thursday, 8 October 2015

Invoice for Payment plymouth.gov.uk

Invoice for Payment plymouth.gov.uk 52405950469_Standard for Email and Print_1529708_EMAIL.doc macro malware.

These emails aren't from these companies at all , they are just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.

Header:
From: {CivicaReports@plymouth.gov.uk}
Subject: Invoice for Payment
 Body:
THIS IS A POST-ONLY EMAIL. PLEASE DO NOT REPLY TO THIS MESSAGE. THIS EMAIL ADDRESS
IS NOT MONITORED FOR RESPONSES.

From: Plymouth LIVE SYSTEM (New)

To: Ms Annette Watson

Please find attached your invoice for payment in accordance with our agreed terms and conditions.

The invoice is sent in PDF format. Double click on the attachment to open the file.

PDF files require Adobe Acrobat Reader to view them. Download Adobe Acrobat Reader
free of charge from the Adobe website at www.adobe.com/products/reader


For enquiries specifically relating to this invoice, please e-mail : incomes@plymouth.gov.uk

This e-mail is confidential and intended for the exclusive use of the addressee.

Any views or opinions expressed in this e-mail do not necessarily represent those of Plymouth City Council, and are not to be relied upon without subsequent written confirmation by an authorised representative. If you are not the addressee, any disclosure, reproduction, distribution, forwarding, or other dissemination or use is strictly prohibited. If you have received this e-mail in error please notify the Plymouth City Council Transaction Centre (incomes) helpdesk on 01752 304443

Plymouth City Council, The Civic Centre, Armada Way, Plymouth, PL1 2AA.

Telephone : 01752 668000 Website : www.plymouth.gov.uk



Attachment:
52405950469_Standard for Email and Print_1529708_EMAIL.doc
Sha256 Hashes:
70f483f464b7f5e2361fd9eb5a3a90dbaed5f6cda7ba7628d7f2d9050722ad4f [1]
c7e31528eb9b11bdb035d00095ed8b3ad3c4179c6960764a56ac8ff565ae7c86 [2]
6cf70f0c0df1f9073326b5ae19726d68511f7938735069d4cd0c82f8ca31fe50 [3]
335f6af95b47573ac6ac7da619b9e40c1d9ac17e4bec71703e024b20e093237c [4]
89642abbfd4e8cc382f155b1d1b27c1aa94ced34636c1c6d0f34de19914e1b29 [5]
Malware Virus Scanner Reports:
VirusTotal Report: [1] (detection 2/56)
VirusTotal Report: [2] (detection 2/56)
VirusTotal Report: [3] (detection 2/56)
VirusTotal Report: [4] (detection 2/56)
VirusTotal Report: [5] (detection 2/56)

Sanesecurity sigs (badmacro.ndb) detected this as:
Sanesecurity.Badmacro.Doc.CreObj

NOTE

The current round of Word/Excel/XML/Docm attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

No comments: