2013 November 4 20:45 GMT
2013 December 10 13:39 GMT
Email messages that are related to this threat (RuleID7699 and RuleID7699kvr) may contain any of the following files:
The invit.exe file in the invitation55B9934710.zip attachment has a file size of 95,545 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x4BC8CBA2163093C0A3764C592B32EDCE
The wire.exe file in the Payment Slip.zip attachment has a file size of 320,512 bytes. The MD5 checksum is the following string: 0xECCFA025102679ED7C99A4BC58D4E8EE
The Payments.exe file in the order.zip attachment has a file size of 1,525,760 bytes. The MD5 checksum, is the following string: 0x278C8DE2614522652104F5BDAEB79578
The Payment Receipt.exe file in the Payment Receipt.zip attachment has a file size of 420,864 bytes. The MD5 checksum is the following string: 0x45EC79A989DFAF3A788FC28AA87509EA
The_ transfer.exe_ file in the payment slip.zip attachment has a file size of 304,640 bytes. The MD5 checksum is the following string: 0xA8876869A9A7087A56A8A24DFFBE1C
The wire slip.exe file in the Payment Details.zip attachment has a file size of 1,245,184 bytes. The MD5 checksum is the following string: 0x0D2C41601203F47993C6649F1296808E
The payment.exe file in the Payment Slip.zip attachment has a file size of 900,672 bytes. The MD5 checksum is the following string: 0x6A859AB3C25D609EE3C1B2210E774DB4
The payment slip.EXE file in the payment slip.zip attachment has a file size of 1,697,792 bytes. The MD5 checksum is the following string: 0x559EDD76A1D5FF0462143B50C9D1EAD4
The following text is a sample of the email message that is associated with this threat outbreak:
> Message Body:
Please find attached the above, which I thought that you maybe interested in attending.
Senior Relationship Manager
1 St Paul's Place
121 Norfolk Street
Sheffield S1 2JF
Telephone: 0114 2066516
Fax: 0114 2723130
Mobile: 07801 194982
National Westminster Bank Plc, Registered in England No. 929027. Registered Office: 135 Bishopsgate, London EC2M 3UR.
Authorised and regulated by the Financial Services Authority.
This email message is confidential and for use by the addressee only. If the message is received by anyone other than the addressee, please return the message to the sender by replying to it and then delete the message from your computer.
Internet emails are not necessarily secure. National Westminster Bank Plc does not accept responsibility for changes made to this message after it was sent. National Westminster Bank Plc may monitor emails for business and operational purposes. By replying to this message you give your consent to our monitoring of your email communications with us.
Whilst all reasonable care has been taken to avoid the transmission of viruses, it is the responsibility of the recipient to ensure that the onward transmission, opening or use of this message and any attachments will not adversely affect its systems or data. No responsibility is accepted by National Westminster Bank Plc in this regard and the recipient should carry out such virus and other checks as it considers appropriate.
Supporting your business ambitions www.natwest.com/ahead
> Message Body:
please check attachment to view our order.
> Subject: Fw: Money was transferred from your account
We discovered an unusual activities on your Online Bank
Account. Someone transferred some money from your account.
Kindly download the payment statement to cancel the
Online Bank Team.**
> Subject: payment slip
Attached is the payment slip of the payment made into your account today.
Please confirm that the account details are correct as attached .
Looking forward to hear from you.
Thanks & Regards
Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.
Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.
| | 2013-November-06 15:56 GMT
1 | Cisco Security has detected significant activity on November 4, 2013. | | 2013-November-04 20:45 GMT
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products