Threat Outbreak Alert: Fake Meeting Invitation Email Messages on December 9, 2013

2013-11-04T20:45:07
ID CISCO-THREAT-31616
Type ciscothreats
Reporter Cisco
Modified 2013-12-10T13:39:57

Description

Medium

Alert ID:

31616

First Published:

2013 November 4 20:45 GMT

Last Updated:

2013 December 10 13:39 GMT

Version:

7

Summary

  • Cisco Security has detected significant activity related to spam email messages that claim to contain a meeting invitation for the recipient. The text in the email message attempts to convince the recipient to open the attachment for details. However, the .zip attachment contains a malicious .exe file that, when executed, attempts to infect the system with malicious code.

Email messages that are related to this threat (RuleID7699 and RuleID7699kvr) may contain any of the following files:

> invitation55B9934710.zip
invit.exe
Payment Slip.zip
wire.exe
order.zip
Payments.exe
Payment Receipt.zip
Payment Receipt.exe
transfer.exe
Details.zip
wire slip.exe
payment.exe
payment slip.EXE

The invit.exe file in the invitation55B9934710.zip attachment has a file size of 95,545 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x4BC8CBA2163093C0A3764C592B32EDCE

The wire.exe file in the Payment Slip.zip attachment has a file size of 320,512 bytes. The MD5 checksum is the following string: 0xECCFA025102679ED7C99A4BC58D4E8EE

The Payments.exe file in the order.zip attachment has a file size of 1,525,760 bytes. The MD5 checksum, is the following string: 0x278C8DE2614522652104F5BDAEB79578

The Payment Receipt.exe file in the Payment Receipt.zip attachment has a file size of 420,864 bytes. The MD5 checksum is the following string: 0x45EC79A989DFAF3A788FC28AA87509EA

The_ transfer.exe_ file in the payment slip.zip attachment has a file size of 304,640 bytes. The MD5 checksum is the following string: 0xA8876869A9A7087A56A8A24DFFBE1C

The wire slip.exe file in the Payment Details.zip attachment has a file size of 1,245,184 bytes. The MD5 checksum is the following string: 0x0D2C41601203F47993C6649F1296808E

The payment.exe file in the Payment Slip.zip attachment has a file size of 900,672 bytes. The MD5 checksum is the following string: 0x6A859AB3C25D609EE3C1B2210E774DB4

The payment slip.EXE file in the payment slip.zip attachment has a file size of 1,697,792 bytes. The MD5 checksum is the following string: 0x559EDD76A1D5FF0462143B50C9D1EAD4

The following text is a sample of the email message that is associated with this threat outbreak:

> Message Body:

Good morning,
Please find attached the above, which I thought that you maybe interested in attending.
Kind Regards.
Graham Nevin
Senior Relationship Manager
Commercial Banking
NatWest
1 St Paul's Place
121 Norfolk Street
Sheffield S1 2JF
Telephone: 0114 2066516
Fax: 0114 2723130
Mobile: 07801 194982
Email: graham.nevin@rbs.co.uk
National Westminster Bank Plc, Registered in England No. 929027. Registered Office: 135 Bishopsgate, London EC2M 3UR.
Authorised and regulated by the Financial Services Authority.
This email message is confidential and for use by the addressee only. If the message is received by anyone other than the addressee, please return the message to the sender by replying to it and then delete the message from your computer.
Internet emails are not necessarily secure. National Westminster Bank Plc does not accept responsibility for changes made to this message after it was sent. National Westminster Bank Plc may monitor emails for business and operational purposes. By replying to this message you give your consent to our monitoring of your email communications with us.
Whilst all reasonable care has been taken to avoid the transmission of viruses, it is the responsibility of the recipient to ensure that the onward transmission, opening or use of this message and any attachments will not adversely affect its systems or data. No responsibility is accepted by National Westminster Bank Plc in this regard and the recipient should carry out such virus and other checks as it considers appropriate.
Supporting your business ambitions www.natwest.com/ahead
Picture (Metafile)

Or

> Message Body:

please check attachment to view our order.

Or

> Subject: Fw: Money was transferred from your account

Message Body:

**Dear Customer,

We discovered an unusual activities on your Online Bank
Account. Someone transferred some money from your account.
Kindly download the payment statement to cancel the
transaction.

Regards,
Online Bank Team.**

Or

> Subject: payment slip

Message Body:

Sir,
Attached is the payment slip of the payment made into your account today.
Please confirm that the account details are correct as attached .
Looking forward to hear from you.
Thanks & Regards
Rita Chan

Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network

Revision History

  • Version | Description | Section | Date
    ---|---|---|---
    7 | Cisco Security has detected significant activity on December 9, 2013. | | 2013-December-10 13:39 GMT
    6 | Cisco Security has detected significant activity on December 2, 2013. | | 2013-December-03 16:38 GMT
    5 | Cisco Security has detected significant activity on November 15, 2013. | | 2013-November-18 16:54 GMT
    4 | Cisco Security has detected significant activity on November 15, 2013. | | 2013-November-15 16:07 GMT
    3 | Cisco Security has detected significant activity on November 9, 2013. | | 2013-November-11 21:25 GMT
    2 | Cisco Security has detected significant activity on November 6, 2013.

| | 2013-November-06 15:56 GMT
1 | Cisco Security has detected significant activity on November 4, 2013. | | 2013-November-04 20:45 GMT
Show Less


Legal Disclaimer

  • THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products