2013 October 15 16:00 GMT
Email messages that are related to this threat (RuleID7440) may contain the following files:
The fl_monthly_statements.exe file in the fl_weekly_statements_659766264.zip attachment has a file size of 409,088 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x3C147F9BC8D3361BAC4052EE2E2FBD65
The following text is a sample of the email message that is associated with this threat outbreak:
> Message Body:
Your monthly invoice is enclosed to the letter.
It confirms the monthly fee and the date we will request your next Direct Debit payment.
Please open the details of your invoice carefully. If you need to contact us then you'll find the numbers on the enclosed to the letter invoice - do not reply to this automated mail as responses are not read.
BT Website Solutions Team
Tel: 0800 889 365
Customer number 353609697
This mail contains BT information, which may be privileged or private. It's meant only for the individual(s) or entity named above. If you're not the intended recipient, note that disclosing, copying, distributing or using this information is prohibited. If you've received this mail in error, please let me know immediately on the e-mail address above. Thank you.
We monitor our e-mail system, and may record your e-mails.
British Telecommunications plc
Registered office: 79 Newgate Street London BB1A 7BB
Registered in England no: 1800000
Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.
Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products