Threat Outbreak Alert: Fake Bank Payment Information Email Messages on August 19, 2013

2013-07-24T16:26:40
ID CISCO-THREAT-30204
Type ciscothreats
Reporter Cisco
Modified 2013-08-19T17:23:12

Description

Medium

Alert ID:

30204

First Published:

2013 July 24 16:26 GMT

Last Updated:

2013 August 19 17:23 GMT

Version:

3

Summary

  • Cisco Security has detected significant activity related to spam email messages that claim to contain bank payment information for the recipient. The text in the email message attempts to convince the recipient to open the attachment and view the details. However, the .zip attachment contains a malicious .exe file that, when executed, attempts to infect the system with malicious code.

Email messages that are related to this threat (RuleID6687 and RuleID6687KVR) may contain any of the following files:

> Payment Advice [G65989211134].zip
Payment Advice [G65{_net1}].exe
Payment Advice [G75022265133].zip
Payment Advice [G75{_net1}].exe
Payment Advice [G75969583288].zip

The Payment Advice [G65{_net1}].exe file in the Payment Advice [G65989211134].zip attachment has a file size of 124,416 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0xB7863D4FD7776618ACDD6853E8256DC5

The Payment Advice [G75{_net1}].exe file in the Payment Advice [G75022265133].zip attachment has a file size of 121,344 bytes. The MD5 checksum is the following string: 0xE12CCA57F14A762C7B33B9C3D39DBECC

A variant of the Payment Advice [G75{_net1}].exe file in the Payment Advice [G75969583288].zip attachment has a file size of 120,320 bytes. The MD5 checksum is the following string: 0xD3A0C3E8154B935C0BF81DF81F8531D2

The following text is a sample of the email message that is associated with this threat outbreak:

> Subject: Payment Advice - Advice Ref:[G65989211134] / Priority payment / Customer Ref:[43 279S421P8I]

Message Body:

**Sir/Madam
The attached payment advice is issued at the request of our customer. The advice is for your reference only.
Yours faithfully
Global Payments and Cash Management
HSBC


This is an auto-generated email, please DO NOT REPLY. Any replies to this email will be disregarded.


This e-mail is confidential. It may also be legally privileged. If you are not the addressee you may not copy, forward, disclose or use any part of it. If you have received this message in error, please delete it and all copies from your system and notify the sender immediately by return e-mail.


"SAVE PAPER - THINK BEFORE YOU PRINT!"
**

Or

> Subject: **Payment Advice - Advice Ref:[G75969583288] / Priority payment / Customer Ref:[63681S632U9I]

Message Body:

Sir/Madam
The attached payment advice is issued at the request of our customer. The advice is for your reference only.
Yours faithfully
Global Payments and Cash Management
HSBC


This is an auto-generated email, please DO NOT REPLY. Any replies to this email will be disregarded.


This e-mail is confidential. It may also be legally privileged. If you are not the addressee you may not copy, forward, disclose or use any part of it. If you have received this message in error, please delete it and all copies from your system and notify the sender immediately by return e-mail.


"SAVE PAPER - THINK BEFORE YOU PRINT!"
**


> Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network

Revision History

  • Version | Description | Section | Date
    ---|---|---|---
    3 | Cisco Security has detected significant activity on August 19, 2013. | | 2013-August-19 17:23 GMT
    2 | Cisco Security has detected significant activity on August 16, 2013. | | 2013-August-17 19:22 GMT
    1 | Cisco Security has detected significant activity on July 24, 2013. | | 2013-July-24 16:26 GMT
    Show Less

Legal Disclaimer

  • THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products