Threat Outbreak Alert: Fake Purchase Order Confirmation E-mail Messages on March 15, 2013
IntelliShield: Threat Outbreak Alert
2012 September 24 21:00 GMT
2013 March 15 22:29 GMT
Cisco Security Intelligence Operations has detected significant activity on March 15, 2013.
Cisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain purchase order information for the recipient. The text in the e-mail message attempts to persuade the recipient to open the attachment and view the details. However, the .zip attachment contains a malicious .scr file that, when executed, attempts to infect the system with malicious code.
E-mail messages that are related to this threat (RuleID4572KVR) may contain the following files:
Order.zip deCrypted.scr Nota_fiscal_222239460.zip nota_fiscal_0124511254892.scr Purchase Order.zip Purchase Order.scr Order.scr Payment Slip.zip P.I.exe PO-01.zip New ans (2).scr dddddd.exe
The deCrypted.scr file in the Order.zip attachment has a file size of 614,517 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x633CB6E07CC421BF85DAAC4D526547FF
The nota_fiscal_0124511254892.scr file in the Nota_fiscal_222239460.zip attachment has a file size of 488,960 bytes. The MD5 checksum is the following string: 0xAE4E3A5621F4DA6F1D5EA4F89DE51F3D
The Purchase Order.scr file in the Purchase Order.zip attachment has a file size of 311,808 bytes. The MD5 checksum is the following string: 0x6AA7790DCC16D8FC7744B0DFEA078351
The Order.scr file in the Order.zip attachment has a file size of 188,928 bytes. The MD5 checksum is the following string: 0x4D8C758A655188B16DD9F97115DE44BA
The P.I.exe file in the Payment Slip.zip attachment has a file size of 688,418 bytes. The MD5 checksum is the following string: 0x65AD9CFCB8D9F6BA35353520084168A7
The New ans (2).scr file in the PO-01.zip attachment has a file size of 188,928 bytes. The MD5 checksum is the following string: 0xF64E0E61E92E590E46C57C369A559489
The dddddd.exe file in the Payment Slip.zip attachment has a file size of 985,817 bytes. The MD5 checksum is the following string: 0x3DCDC74C308287F2A043283930B06EC7
The following text is a sample of the e-mail message that is associated with this threat outbreak:
Subject: TRIAL PURCHASE ORDER CONFIRMATION...
Kindly check the attached purchase order and arrange to despatch the materials as soon as possible.
Take action with respect to the consolidation of the purchase order above.
----- End forwarded message -----
Esta mensagem refere-se à Nota Fiscal NFS-e No. 0004514823624
emitida pelo prestador de serviços:
Razão Social: AMERICANAS.COM COMÉRCIO DE ELETRÔNICOS LTDA.
CCM : 3.218.906-0
COMPRA DEBITADO EM SEU CARTÃO EM 3 VESES SEM JUROS.
SEGUE ANEXO NOTA FISCAL E PRAZO DE ENTREGA..
Subject: Purchase Order For January
I have attached the signed purchase order list. Please confirm same so
we could expedite action on the process.
Please review and send us the PI to enable us make payment.
Supervisor / Purchasing
Subject: Re: Payment Slip.
Happy New Year to you. My Name is Mario Danilo. My colllegue contacted you last year as regards your products.
We have resumed for the year 2013 and we are ready to make purchase as earlier agreed.
Pls find attached the payment Confirmation slip of 30% via TT Bank Transfer. We will make complete payment on our previously agreed terms.
Please get back to me if you need any more clarification.
Head Accounting Department
Cisco Security Intelligence Operations analysts examine real-world e-mail traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global e-mail security threats and trends. Cisco will continue to monitor this threat and automatically adapt IronPort systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.
Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. E-mail that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam e-mail and hostile web URLs from being passed to the end user.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.