2013 June 24 20:55 GMT
2013 September 12 15:16 GMT
Email messages that are related to this threat (RuleID6349 and RuleID6349KVR) may contain the following files:
The Visualizar_Deposito.cpl file in the Visualizar_Deposito.zip archive has a file size of 75,264 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x91436A43EBA39C48C2FE900488A3A301
The deposito_nfe29381.exe file in the deposito_nfe29381.zip attachment has a file size of 702,976 bytes. The MD5 checksum is the following string: 0xD0FA33209D92A95B9A32E4E3402F5D88
A variant of the deposito_nfe29381.exe file in the deposito_nfe29381.zip attachment has a file size of 1,126,400 bytes. The MD5 checksum is the following string: 0x8F31DA37E3677A4C8AE1F89576C3E283
A third variant of the deposito_nfe29381.exe file in the deposito_nfe29381.zip attachment has a file size of 1,683,426 bytes. The MD5 checksum is the following string: 0x943A068B043CE56DAF7B5FA085E93CA5
The DepositoDPVAT.cpl file in the DepositoDPVAT.zip attachment has a file size of 376,832 bytes. The MD5 checksum is the following string: 0x19DEB325503AC37DF284112A5B11041C
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: WW Enc: Depósito Confirmado domingo, 23 de junho de 2013
O deposito foi confirmado conforme solicitado.
Roberth Carvalho Pelarie (Dpto.Financeiro)
1 anexos | comprovante.PDF ( 162 Kb )[
> Subject: ENC: Comprovante da transferência para sua conta 24/06/2013 21:52:41 9,908601E-02 ()
Segue anexo com o comprovante de depósito referente a nota de entrega 29381
Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.
Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products