Threat Outbreak Alert

Threat Outbreak Alert: Fake Western Union Money Transfer Transaction Email Messages on April 7, 2014

 
Threat Type:IntelliShield: Threat Outbreak Alert
IntelliShield ID:21930
Version:16
First Published:2010 December 01 13:41 GMT
Last Published:2014 April 09 13:07 GMT
Port: Not available
Urgency:Possible use
Credibility:Confirmed
Severity:Mild Damage
 
Version Summary:Cisco Security Intelligence Operations has detected significant activity on April 7, 2014.
 

Description
 
Cisco Security Intelligence Operations has detected significant activity related to spam email messages that claim to contain an attachment with information about a Western Union money transfer transaction. The text in the email message instructs the recipient to view the attached .zip file for details. However, the attachment contains a malicious .exe file that, when executed, attempts to infect the targeted system with malicious code.

Email messages that are related to this threat (RuleID858KVR) may contain the following files:

report.zip
report.exe
details.zip
details.exe
Report.zip
Unauthorized_Report_EML.htm
incoming_wire_report.zip
incoming_wire_report.exe
WireReport.zip
WireReport.exe
OutGoingWireReport.zip
OutGoingWireReport.exe
Transfer information.zip
INSTRUCTION.exe
instruction.zip
instruction.exe
product info.zip
product info.exe
EFTPS_Document.zip
EFTPS_Document.exe
viabmk8iwire_transfer_details.zip
wire_transfer_details.scr

incoming_wire_report.scr

The report.exe file in the report.zip attachment has a file size of 161,296 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x117F1D5A82CDAB71372906EC6E7EDBB0

The details.exe file in the details.zip attachment has a file size of 15,360 bytes. The MD5 checksum is the following string: 0xCD5D1CBF928D97A94BA30ABC0357DF2C

The Unauthorized_Report_EML.htm file in the Report.zip attachment has a file size of 54,784 bytes. The MD5 checksum is the following string: 0x90C8EB0AC6D9303FBE32D0F351D1EAAD

The incoming_wire_report.exe file in the incoming_wire_report.zip attachment has a file size of 107,520 bytes. The MD5 checksum is the following string: 0xD13F6FA4CEA17B254216394B5CA6A3A1

The WireReport.exe file in the WireReport.zip attachment has a file size of 1,134,080 bytes. The MD5 checksum is the following string: 0xE1AD488E8E81844FFB6B88D07B13E8B8

A variant of the WireReport.exe file in the WireReport.zip attachment has a file size of 113,152 bytes. The MD5 checksum is the following string: 0xD2FDAF1E0F07F5DC6C638F0103FA26B7

A third variant of the WireReport.exe file in the WireReport.zip attachment has a file size of 113,152 bytes. The MD5 checksum is the following string: 0xADC79DDD078E7B9D6743C6D004D2648F

The OutGoingWireReport.exe file in the OutGoingWireReport.zip attachment has a file size of 1,120,218 bytes. The MD5 checksum is the following string: 0x76B3E6A581AB6D75F3B5A75DB416B91B

The INSTRUCTION.exe file in the Transfer information.zip attachment has a file size of 451,072 bytes. The MD5 checksum is the following string: 0x8964B632E24FB2157E0D660EA2E3525F<

The instruction.exe file in the instruction.zip attachment has a file size of 451,072 bytes. The MD5 checksum is the following string: 0xCB3144CD0600784B2DECECC1682A377A

A variant of instruction.exe file in the instruction.zip attachment has a file size of 451,072 bytes. The MD5 checksum is the following string: 0x9D9610BAB7B9F64F1369D6E266CD3F51

The product info.exe file in the product info.zip attachment has a file size of 340,480 bytes. The MD5 checksum is the following string: 0x01D35B7C2A8A822004B4C175207CF6B3

The EFTPS_Document.exe file in the EFTPS_Document.zip attachment has a file size of 67,584 bytes. The MD5 checksum is the following string: 0xDF656A5ED2D4C0FDE0844B40565836D2

The wire_transfer_details.scr file in the viabmk8iwire_transfer_details.zip attachment has a file size of 340,480 bytes. The MD5 checksum is the following string: 0xE40565AA17271F4B69067B8917EABE61

The incoming_wire_report.scr file in the incoming_wire_report.zip attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0x25D7B15F5670C720128812A77D1BAAD7

A variant of incoming_wire_report.scr file in the incoming_wire_report.zip attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0x5E3E62AB9E0914977A29C0CF6710DEBD

A third variant of incoming_wire_report.scr file in the incoming_wire_report.zip attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0xC39C6743F87BD4E395CE3ACACC804FCB

The following text is a sample of the e-mail message that is associated with this threat outbreak:

Subject: Western Union Money Transfer Transaction

Message Body:

Western Union Money Transfer Transaction that you (or somebody on your behalf) enquired earlier hasn't been authorized.
For more information concerning transfer validation or money refund Please review the attachment.

Or

Subject: Incoming Wire Notification

Message Body:

Incoming Wire Notification.
An incoming wire transfer has been received by your financial institution and the funds deposited to your account on 12-12-2012.
Please review the transaction details in attached report.

Or

Subject: Incoming Wire Transfer Notification

Message Body:

Incoming Wire Transfer Notification
Amount: $105,167.19
Please review the transaction details in attached report.
This E-Mail box is not equipped to handle replies. If you have any questions or need assistance, please contact Cash Management Services at 1-888-943-1383

Or

Subject: Wire Transfer Processed Notification

Message Body:

Wire Transfer Processed Notification
Amount: $1,103,436.45
Please review the transaction details in attached report.
First American Title Insurance Company
5000 Tamiami Trail North
Naples, Fl. 34103
877-833-1754 Phone
866-754-3015 Fax
Servicing Lee and Collier Counties
PLEASE NOTE ALL CLOSING PACKAGES SHOULD BE SENT TO:
NAPLES.ESCROW.FL@FIRSTAM.COM

Or

Subject: PAYMENT INSTRUCTION

Message Body:

Dear sir ,
kindly find the attached for the transfer instruction,also send your local bank details so we can transfer the equilvalent in your local currency.
The transfer information is in the attached, the beneficiaries,amount,country and other information needed for the transfer.
i hope the exchange rate and transfer charges is still the same rate .
Thanks
Ali kabiru

Or

Subject: Wire Notification

Message Body:

Incoming Wire Notification.
An incoming wire transfer has been received by your financial institution and the funds deposited to your account on 25-03-2014.
Please review the transaction details in attached report.
Ref id: mx6818q002

Cisco Security Intelligence Operations analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security Intelligence Operations
Cisco Threat Operations Center
Cisco SenderBase Security Network
 
Alert History
 

Version 15, April 8, 2014, 9:12 AM: Cisco Security Intelligence Operations has detected significant activity on April 7, 2014.

Version 14, September 12, 2013, 11:20 AM: Cisco Security Intelligence Operations has detected significant activity on September 11, 2013.

Version 13, March 7, 2013, 5:07 PM: Cisco Security Intelligence Operations has detected significant activity on March 7, 2013.

Version 12, March 5, 2013, 5:52 AM: Cisco Security Intelligence Operations has detected significant activity on March 5, 2013.

Version 11, February 25, 2013, 5:39 AM: Cisco Security Intelligence Operations has detected significant activity on February 24, 2013.

Version 10, February 22, 2013, 11:38 AM: Cisco Security Intelligence Operations has detected significant activity on February 22, 2013.

Version 9, February 18, 2013, 6:30 AM: Cisco Security Intelligence Operations has detected significant activity on February 17, 2013.

Version 8, February 13, 2013, 10:54 AM: Cisco Security Intelligence Operations has detected significant activity on February 13, 2013.

Version 7, January 28, 2013, 9:54 AM: Cisco Security Intelligence Operations has detected significant activity on January 28, 2013.

Version 6, January 28, 2013, 8:17 AM: Cisco Security Intelligence Operations has detected significant activity on January 28, 2013.

Version 5, January 4, 2013, 6:03 AM: Cisco Security Intelligence Operations has detected significant activity on January 3, 2013.

Version 4, December 12, 2012, 7:18 AM: Cisco Security Intelligence Operations has detected significant activity on December 12, 2012.

Version 3, April 13, 2012, 8:05 AM: Cisco Security Intelligence Operations has detected significant activity on April 12, 2011.

Version 2, April 8, 2011, 7:38 AM: Cisco Security Intelligence Operations has detected significant activity on April 7, 2011.

Version 1, December 1, 2010, 8:41 AM: Cisco Security Intelligence Operations has detected significant activity on November 30, 2010.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldThreat Outbreak Alert Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield