2016 February 8 13:43 GMT
Email messages that are related to this threat (RuleID20971) may contain the following files:
Name | Size in Bytes | MD5 Checksum
shipment details.jar | Not Available | 0x425F0B14D5D5E16D79B61913B191B9E9
inv.jar | 15,769 | 0xD994FC8C2470A108C166F9E344E52E43
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: SHPNG DOCS/DHL No. : PFI - Nitric Acid - 6 FCLs -BIAFO
Please find below shipment details:
Container No. SIKU 3096352, SIKU 2974999, SIKU 3020660
ETD Works 07.01.2016
Vessel/Voy. no. BAHAMAS / 009E
ETD Port - 12.01.2016
> Subject: payment
Please find attached payment information
made to your account for settlement of invoice attached.
Kindly confirm once you received the payment/s.
Note: payment will be successfully received
within 72 banking hours.
If you didn't give any feedback within 3-5 banking days,
this payment will be considered successfully received.
Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products