Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Threat Outbreak Alert

Threat Outbreak Alert: Fake Western Union Money Transfer Transaction Email Messages on October 20, 2014

 
Threat Type:IntelliShield: Threat Outbreak Alert
IntelliShield ID:21930
Version:20
First Published:2010 December 01 13:41 GMT
Last Published:2014 October 22 11:48 GMT
Port: Not available
Urgency:Possible use
Credibility:Confirmed
Severity:Mild Damage
 
 
Version Summary:Cisco Security Intelligence Operations has detected significant activity on October 20, 2014.
 

Description
 
Cisco Security Intelligence Operations has detected significant activity related to spam email messages that claim to contain an attachment with information about a Western Union money transfer transaction. The text in the email message instructs the recipient to view the attached .zip file for details. However, the attachment contains a malicious .exe file that, when executed, attempts to infect the targeted system with malicious code.

Email messages that are related to this threat (RuleID858KVR) may contain the following files:

report.zip
report.exe
details.zip
details.exe
Report.zip
Unauthorized_Report_EML.htm
incoming_wire_report.zip
incoming_wire_report.exe
WireReport.zip
WireReport.exe
OutGoingWireReport.zip
OutGoingWireReport.exe
Transfer information.zip
INSTRUCTION.exe
instruction.zip
instruction.exe
product info.zip
product info.exe
EFTPS_Document.zip
EFTPS_Document.exe
viabmk8iwire_transfer_details.zip
wire_transfer_details.scr

incoming_wire_report.scr
RTGS Details.zip
RTGS Details.exe
mt1031.6.zip
text.exe

ACH_Import_Information.zip
ACH_Import_Information.exe
file.zip
JAMESS.exe

The report.exe file in the report.zip attachment has a file size of 161,296 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x117F1D5A82CDAB71372906EC6E7EDBB0

The details.exe file in the details.zip attachment has a file size of 15,360 bytes. The MD5 checksum is the following string: 0xCD5D1CBF928D97A94BA30ABC0357DF2C

The Unauthorized_Report_EML.htm file in the Report.zip attachment has a file size of 54,784 bytes. The MD5 checksum is the following string: 0x90C8EB0AC6D9303FBE32D0F351D1EAAD

The incoming_wire_report.exe file in the incoming_wire_report.zip attachment has a file size of 107,520 bytes. The MD5 checksum is the following string: 0xD13F6FA4CEA17B254216394B5CA6A3A1

The WireReport.exe file in the WireReport.zip attachment has a file size of 1,134,080 bytes. The MD5 checksum is the following string: 0xE1AD488E8E81844FFB6B88D07B13E8B8

A variant of the WireReport.exe file in the WireReport.zip attachment has a file size of 113,152 bytes. The MD5 checksum is the following string: 0xD2FDAF1E0F07F5DC6C638F0103FA26B7

A third variant of the WireReport.exe file in the WireReport.zip attachment has a file size of 113,152 bytes. The MD5 checksum is the following string: 0xADC79DDD078E7B9D6743C6D004D2648F

The OutGoingWireReport.exe file in the OutGoingWireReport.zip attachment has a file size of 1,120,218 bytes. The MD5 checksum is the following string: 0x76B3E6A581AB6D75F3B5A75DB416B91B

The INSTRUCTION.exe file in the Transfer information.zip attachment has a file size of 451,072 bytes. The MD5 checksum is the following string: 0x8964B632E24FB2157E0D660EA2E3525F<

The instruction.exe file in the instruction.zip attachment has a file size of 451,072 bytes. The MD5 checksum is the following string: 0xCB3144CD0600784B2DECECC1682A377A

A variant of instruction.exe file in the instruction.zip attachment has a file size of 451,072 bytes. The MD5 checksum is the following string: 0x9D9610BAB7B9F64F1369D6E266CD3F51

The product info.exe file in the product info.zip attachment has a file size of 340,480 bytes. The MD5 checksum is the following string: 0x01D35B7C2A8A822004B4C175207CF6B3

The EFTPS_Document.exe file in the EFTPS_Document.zip attachment has a file size of 67,584 bytes. The MD5 checksum is the following string: 0xDF656A5ED2D4C0FDE0844B40565836D2

The wire_transfer_details.scr file in the viabmk8iwire_transfer_details.zip attachment has a file size of 340,480 bytes. The MD5 checksum is the following string: 0xE40565AA17271F4B69067B8917EABE61

The incoming_wire_report.scr file in the incoming_wire_report.zip attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0x25D7B15F5670C720128812A77D1BAAD7

A variant of incoming_wire_report.scr file in the incoming_wire_report.zip attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0x5E3E62AB9E0914977A29C0CF6710DEBD

A third variant of incoming_wire_report.scr file in the incoming_wire_report.zip attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0xC39C6743F87BD4E395CE3ACACC804FCB

The RTGS Details.exe file in the RTGS Details.zip attachment has a file size of 189,440 bytes. The MD5 checksum is the following string: 0x3D759584EF967B5622EF104FAF5C75EC

The text.exe file in the mt1031.6.zip attachment has a file size of 184,832 bytes. The MD5 checksum is the following string: 0xB63E469DC7E1C4143BDA8AD22E92026F

The ACH_Import_Information.exe file in the ACH_Import_Information.zip attachment has a file size of 38,912 bytes. The MD5 checksum is the following string: 0x239AFC70CCD73A4BB6940AE9318A4B05

The JAMESS.exe file in the file.zip attachment has a file size of 181,248 bytes. The MD5 checksum is the following string: 0xD76FC210E207651D4E6337E3F268CB9A

The following text is a sample of the e-mail message that is associated with this threat outbreak:

Subject: Western Union Money Transfer Transaction

Message Body:

Western Union Money Transfer Transaction that you (or somebody on your behalf) enquired earlier hasn't been authorized.
For more information concerning transfer validation or money refund Please review the attachment.

Or

Subject: Incoming Wire Notification

Message Body:

Incoming Wire Notification.
An incoming wire transfer has been received by your financial institution and the funds deposited to your account on 12-12-2012.
Please review the transaction details in attached report.

Or

Subject: Incoming Wire Transfer Notification

Message Body:

Incoming Wire Transfer Notification
Amount: $105,167.19
Please review the transaction details in attached report.
This E-Mail box is not equipped to handle replies. If you have any questions or need assistance, please contact Cash Management Services at 1-888-943-1383

Or

Subject: Wire Transfer Processed Notification

Message Body:

Wire Transfer Processed Notification
Amount: $1,103,436.45
Please review the transaction details in attached report.
First American Title Insurance Company
5000 Tamiami Trail North
Naples, Fl. 34103
877-833-1754 Phone
866-754-3015 Fax
Servicing Lee and Collier Counties
PLEASE NOTE ALL CLOSING PACKAGES SHOULD BE SENT TO:
NAPLES.ESCROW.FL@FIRSTAM.COM

Or

Subject: PAYMENT INSTRUCTION

Message Body:

Dear sir ,
kindly find the attached for the transfer instruction,also send your local bank details so we can transfer the equilvalent in your local currency.
The transfer information is in the attached, the beneficiaries,amount,country and other information needed for the transfer.
i hope the exchange rate and transfer charges is still the same rate .
Thanks
Ali kabiru

Or

Subject: Wire Notification

Message Body:

Incoming Wire Notification.
An incoming wire transfer has been received by your financial institution and the funds deposited to your account on 25-03-2014.
Please review the transaction details in attached report.
Ref id: mx6818q002
Or
Message body:

Dear Sir,
NEFT transfer instructions to your account has being put on hold. Due
to incoming amount exceeding maximum limit.
Details of the transfer/transactions INITIATED are as per attached.
Kindly open attachment to see details of the transactions/transfer.
To receive this amount kindly contact us in the email below or visit
your branch with purpose of receiving this amount.
We regret the inconveniences.
This procedure is as a result of the foreign ip address that was used
during the transfer. It is a process to safeguard customers from money
laundering and internet fraud.
Or
Subject: ACH Approval Letter

Message Body:

October 10, 2014
The Automated Clearing House (ACH) application for your company has been processed and the payer unit number assigned is 029762. This number identifies to the Federal Reserve Bank of Cleveland the account to be debited and is required input in the “ABI ACH Payment Authorization Input Record.” It is the responsibility of the payer to use the correct payer unit number in every transaction in which statements are paid via ACH.
You may begin paying statements via ACH.  If you are a Customhouse broker who is using ACH for the first time, please contact your ABI client representative to request that your ABI records be updated to permit ACH filing. If you are already using ACH for other importer statement transmissions, you do not need to contact your ABI client representative. If you are a new ABI importer, please contact your ABI client representative to ensure that the appropriate ABI records are updated to permit you to transmit entry summaries, which will be filed under ACH.
If you are an importer and do not file entries directly with Customs and Border Protection, it is your responsibility to provide your payer unit number to your filer(s). This number can be used in all locations by different filers provided the bank account number is the same.
If you have any questions, you may contact ACH Help Desk at (317) 298-1200, extension 1098.
Sincerely,
Or

Subject: From Mr.Kamnan Aat

Message Body:

Hello Dear
I am Mr.Kamnan Aat a Banker, I wish to ask for your consent about our deceased customer a
citizen of your country whose relatives my Bank cannot locate to claim his estate.
I got your address from online directory service and decided to write you. I am asking
for your consent so that I can present you to my Bank Management as the next of kin of the late customer
account proceeds value $3,600,000 million (Three Million  Six Hundred Thousand United State Dollars)
be transferred into your account for our mutual benefit.
At the successful transfer of this fund, we shall share the fund on a pro rata based percentage
[50% - 50%]. I am compelled to do this because I do not want my Bank to take over the ownership
of this fund.If you are interested and in agreement with me, get back to me quickly and I will send
to you all the information you may need to proceed without coming to the Bank, and be rest assured
that it is risk free project.
I look forward to your reply.
Yours faithfully,
Mr.Kamnan Aat

Cisco Security Intelligence Operations analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security Intelligence Operations
Cisco Threat Operations Center
Cisco SenderBase Security Network
 
Alert History
 

Version 19, October 13, 2014, 10:14 AM: Cisco Security Intelligence Operations has detected significant activity on October 10, 2014.

Version 18, July 22, 2014, 8:03 AM: Cisco Security Intelligence Operations has detected significant activity on July 17, 2014.

Version 17, June 9, 2014, 9:10 AM: Cisco Security Intelligence Operations has detected significant activity on June 6, 2014.

Version 16, April 9, 2014, 9:07 AM: Cisco Security Intelligence Operations has detected significant activity on April 7, 2014.

Version 15, April 8, 2014, 9:12 AM: Cisco Security Intelligence Operations has detected significant activity on April 7, 2014.

Version 14, September 12, 2013, 11:20 AM: Cisco Security Intelligence Operations has detected significant activity on September 11, 2013.

Version 13, March 7, 2013, 5:07 PM: Cisco Security Intelligence Operations has detected significant activity on March 7, 2013.

Version 12, March 5, 2013, 5:52 AM: Cisco Security Intelligence Operations has detected significant activity on March 5, 2013.

Version 11, February 25, 2013, 5:39 AM: Cisco Security Intelligence Operations has detected significant activity on February 24, 2013.

Version 10, February 22, 2013, 11:38 AM: Cisco Security Intelligence Operations has detected significant activity on February 22, 2013.

Version 9, February 18, 2013, 6:30 AM: Cisco Security Intelligence Operations has detected significant activity on February 17, 2013.

Version 8, February 13, 2013, 10:54 AM: Cisco Security Intelligence Operations has detected significant activity on February 13, 2013.

Version 7, January 28, 2013, 9:54 AM: Cisco Security Intelligence Operations has detected significant activity on January 28, 2013.

Version 6, January 28, 2013, 8:17 AM: Cisco Security Intelligence Operations has detected significant activity on January 28, 2013.

Version 5, January 4, 2013, 6:03 AM: Cisco Security Intelligence Operations has detected significant activity on January 3, 2013.

Version 4, December 12, 2012, 7:18 AM: Cisco Security Intelligence Operations has detected significant activity on December 12, 2012.

Version 3, April 13, 2012, 8:05 AM: Cisco Security Intelligence Operations has detected significant activity on April 12, 2011.

Version 2, April 8, 2011, 7:38 AM: Cisco Security Intelligence Operations has detected significant activity on April 7, 2011.

Version 1, December 1, 2010, 8:41 AM: Cisco Security Intelligence Operations has detected significant activity on November 30, 2010.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldThreat Outbreak Alert Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield