Medium
Alert ID:
41777
First Published:
2015 October 28 19:13 GMT
Version:
1
Summary
Email messages that are related to this threat (RuleID19035) may contain the following files:
Name | Size in Bytes | MD5 Checksum |
---|---|---|
wa1.exe | ||
87,288 | ||
0xFCB8647D5AB8C4640E139DF1B988CD7A |
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: Undeliverable: ZFRSSE - CMS Collateral Report(s) as of 10/27/2015
Message Body:
Delivery has failed to these recipients or groups:
[email protected]
The email address you entered couldnβt be found. Please check the recipientβs email address and try to resend the message. If the problem continues, please contact your helpdesk.
Diagnostic information for administrators:
Generating server: ESHH-MAL-01.eshp.co.th
[email protected]
Remote Server returned '550 5.1.1 RESOLVER.ADR.RecipNotFoun
Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.
Related Links
Cisco Security
Cisco SenderBase Security Network
Revision History
* Version | Description | Section | Date |
---|---|---|---|
1 | Initial Release | 2015-October-28 19:13 GMT | |
Show Less |
Legal Disclaimer
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products