Threat Outbreak Alert RuleID14122: Email Messages Distributing Malicious Software on March 19, 2015

2015-03-20T12:57:37
ID CISCO-THREAT-37964
Type ciscothreats
Reporter Cisco
Modified 2015-03-20T19:20:29

Description

Medium

Alert ID:

37964

First Published:

2015 March 20 12:57 GMT

Last Updated:

2015 March 20 19:20 GMT

Version:

2

Summary

  • Cisco Security has detected significant activity related to spam email messages distributing malicious software.

Email messages that are related to this threat (RuleID14122 and RuleID14122KVR) may contain the following files:

Name | Size in Bytes | MD5 Checksum
---|---|---
Denied Domestic Wire transactionD2518295.zip / Contrato.exe
| 647,680
| 0xC0539A6D918B629DFDCA559CC2B6BF27
Canceled Wire transferI1339214.zip / Wire_info_38891.doc | Not Applicable
| 0xAD82dA7E20EC1068832688B6366739F0

The following text is a sample of the email message that is associated with this threat outbreak:

> Subject: Critical message - 01R266298

Message Body:

The Wire transfer, recently initiated from your online banking account, has been aborted by the bank.
Cancelled Wire transfer
Wire Processing Case # N01378675
Transaction Total 32332.14 US Dollars
Cancellation reason See attached statement
Please open the word file attached with this email to have more info about this issue

Or

> Subject: Critical alert - 49K856175

Message Body:

The Recent transfer, just initiated from your company"s checking account, has been aborted by the bank.
Aborted transfer
Wire Case # X70982144
Total Amount 12962.79 US Dollars
Email jwilson@wsgr.com
Cancellation reason See attached MS Word doc
Please check the statement provided with this email to see more info about this issue.

> Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network

Revision History

  • Version | Description | Section | Date
    ---|---|---|---
    2 | Cisco Security has detected significant activity on March 19, 2015. | | 2015-March-20 19:20 GMT
    1 | Cisco Security has detected significant activity on March 19, 2015. | | 2015-March-20 12:57 GMT
    Show Less

Legal Disclaimer

  • THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products