Threat Outbreak Alert RuleID23984: Email Messages Distributing Malicious Software on July 26, 2016

2016-07-26T12:29:48
ID CISCO-THREAT-47235
Type ciscothreats
Reporter Cisco
Modified 2016-07-27T13:49:59

Description

Medium

Alert ID:

47235

First Published:

2016 July 26 12:29 GMT

Last Updated:

2016 July 27 13:49 GMT

Version:

2

Summary

  • Cisco Security has detected significant activity related to spam email messages distributing malicious software.

Email messages that are related to this threat (RuleID23984 and RuleID23984KVR) may contain the following files:

Name | Size in Bytes | MD5 Checksum
---|---|---
RFQ@techie.uue / RFQ@techie.com
| 675,840
| 0x11C347B0DEB498C8A87F87B2E3344872

RFQ@techie.uue / RFQ@techie.com | 692,224 | 0x090B041BC20F2C5CA1C7EA116F785313

The following text is a sample of the email message that is associated with this threat outbreak:

> Subject: REQUEST FOR QUOTATION

Message Body:

Dear Sales
Kindly find the attached RFQ # 2507 # and quote your price and availability to supply the attached requirements.
Awaiting your quotation on urgent basis.
Regards,
Abu Hassan
sales officer
Tel: +966 11 2547022 Ext: 7622 | | | Cell: +966 561408098, 571042968
Important Notice | This email and any attachment there to containers.Payment of corporate proprietary information.
If you have received it by mistake, please notify us immediately by reply e-mail and delete this e-mail &
its attachments from your system. Thank You.

Or

> Subject: REQUEST FOR QUOTATION

Message Body:

Dear Sales,
Kindly find the attached RFQ#2507# and quote your
price and availability to supply the attached
requirements.Awaiting your quotation on urgent
basis.
Regards,

Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network

Revision History

  • Version | Description | Section | Date
    ---|---|---|---
    2 | Cisco Security has detected significant activity on July 26, 2016. | | 2016-July-27 13:49 GMT
    1 | Cisco Security has detected significant activity on July 26, 2016. | | 2016-July-26 12:29 GMT
    Show Less

Legal Disclaimer

  • THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products