Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Threat Outbreak Alert

Threat Outbreak Alert: Fake German Post Delivery Notice E-mail Messages on December 22, 2012

 
Threat Type:IntelliShield: Threat Outbreak Alert
IntelliShield ID:27390
Version:9
First Published:2012 November 09 11:38 GMT
Last Published:2013 January 02 10:50 GMT
Port: Not available
Urgency:Possible use
Credibility:Confirmed
Severity:Harassment
 
Version Summary:Cisco Security Intelligence Operations has detected significant activity on December 22, 2012.
 

Description
 
Cisco Security Intelligence Operations has detected significant activity related to German-language spam e-mail messages that claim to contain a postal delivery failure notification message for the recipient. The text in the e-mail message instructs the recipient to open the attachment to view the postal label. However, the .zip attachment contains a malicious .exe file that, when executed, attempts to infect the system with malicious code.

E-mail messages that are related to this threat (RuleID4784, RuleID4784KVR, and RuleID4963KVR) may contain the following files:

DeutschePost_ID924186-378.zip
DeutschePost_ID736493-134.exe
DeutschePost_ID461230-663.zip
DeutschePost_ID286735634_234.exe
DeutschePost_ID270700-384.zip
DeutschePost_ID_226848_342.exe
Unemployment_case.zip
Unemployment_case.exe
Etiqueta_De_Correos_ES_ID382636.zip
EtiquetaDeCorreos_ES_ID782364.exe
Transfer.zip
lamm.exe
DeutschePost_ID289898-648.zip
DeutschePost_ID3456345-456.exe
DeutschePost_ID400531-600.zip
DeutschePost_ID283248-246.exe
DeutschePost_ID108890-364.zip
DeutschePost_ID248332-236.exe
Out going wire.zip
DeutschePost_ID770498-144.zip
DeutschePost_ID21342341-234.exe

The DeutschePost_ID736493-134.exe file in the DeutschePost_ID924186-378.zip attachment has a file size of 57,856 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x34D031CAD6AD06D9E06054611F172C20

The DeutschePost_ID286735634_234.exe file in the DeutschePost_ID461230-663.zip attachment has a file size of 58,880 bytes. The MD5 checksum is the following string:0xAB5AAE0B7FA344B6BEF7AD032B1A4F26

The file size and MD5 checksum for the DeutschePost_ID_226848_342.exe file in the DeutschePost_ID270700-384.zip attachment are unavailable.

The file size and MD5 checksum for the Unemployment_case.exe file in the Unemployment_case.zip attachment are unavailable.

A variant of the Unemployment_case.exe file in the Unemployment_case.zip attachment has a file size of 94,208 bytes. The MD5 checksum is the following string: 0x008B5CCD54F0F0D9A79BFC45867C6D62

The EtiquetaDeCorreos_ES_ID782364.exe file in the Etiqueta_De_Correos_ES_ID382636.zip attachment has a file size of 53,248 bytes. The MD5 checksum is the following string:0x2924580DCE36E9378E4A9ACEA2FCC025

The lamm.exe file in the Transfer.zip attachment has a file size of 430,080 bytes. The MD5 checksum is the following string: 0x78AB09F4D2840900FBA8A9599828C3E1

The DeutschePost_ID3456345-456.exe file in the DeutschePost_ID289898-648.zip attachment has a file size of 111,104 bytes. The MD5 checksum is the following string: 0x2544E0E8BB0047146A41272FBA5C4C29

The DeutschePost_ID283248-246.exe file in the DeutschePost_ID400531-600.zip attachment has a file size of 117,760 bytes. The MD5 checksum is the following string: 0x59901DCE2C713985DC110992D2578B71

The DeutschePost_ID248332-236.exe file in the DeutschePost_ID108890-364.zip attachment has a file size of 109,568 bytes. The MD5 checksum is the following string: 0xFB9E875D0869F211780A02EF56E685C1

A variant of the lamm.exe file in the Out going wire.zip attachment has a file size of 244,736 bytes. The MD5 checksum is the following string: 0xA98E263AEA6EF77442821071AD18351B

The DeutschePost_ID21342341-234.exe file in the DeutschePost_ID770498-144.zip attachment has a file size of 32,768 bytes. The MD5 checksum is the following string: 0x43F52AB8CEACCD03881CDF9210562586

The following text is a sample of the e-mail message that is associated with this threat outbreak:

Subject: Deutsche Post#Sie mussen eine Postsendung abholen.

Message Body:

Lieber Kunde,
Es ist unserem Boten leider misslungen einen Postsendung an Ihre Adresse zuzustellen.
Grund: Ein Fehler in der Leiferanschrift.
Sie konnen Ihre Postsendung in unserer Postabteilung personlich kriegen.
Anbei finden Sie einen Postetikett.
Sie sollen dieses Postetikett drucken lassen, um Ihre Postsendung in der Postabteilung empfangen zu konnen.
Vielen Dank!
Deutsche Post AG.
Malaysian charged with Facebook insult of sultan
Germans happy with Obama win, but still disagree on austerity
Iraq says expects Exxon to finish West Qurna sale by December
Video: Fla. presidential race too close to call
Video: Extra: Remembering Lina

Or

Subject: Deutsche Post.Holen Sie ihre Postsendung ab

Message Body:

Lieber Kunde,
Es ist unserem Boten leider misslungen einen Postsendung an Ihre Adresse zuzustellen.
Grund: Ein Fehler in der Leiferanschrift.
Sie konnen Ihre Postsendung in unserer Postabteilung personlich kriegen.
Anbei finden Sie einen Postetikett.
Sie sollen dieses Postetikett drucken lassen, um Ihre Postsendung in der Postabteilung empfangen zu konnen.
Vielen Dank!
Deutsche Post AG.


With much respect and sincere good wishes for your welfare, There was something too fine in his nature for the dramatics and the posturings of the political game, as it is usually played.He is a very shy man,

Or

Subject: wire transfer details...................

Message Body:

Dear Customer,
We have just received a $15,465 out going wire transfer instruction on your account ? Please download/view the attachment for details and respond at
your earliest convenience.
Wire Transfer Department.

Or

Subject: Ein Fehler in der Lieferanschrift

Message Body:

Lieber Kunde,
Es ist unserem Boten leider misslungen einen Postsendung an Ihre Adresse zuzustellen.
Grund: Ein Fehler in der Leiferanschrift.
Sie konnen Ihre Postsendung in unserer Postabteilung personlich kriegen.
Anbei finden Sie einen Postetikett.
Sie sollen dieses Postetikett drucken lassen, um Ihre Postsendung in der Postabteilung empfangen zu konnen.
Vielen Dank!
Deutsche Post AG.
Possessed of such knowledge, he will then know, looking back upon his past ignorance and blindness, that his life is, and always was, justly ordered, and that all his

Cisco Security Intelligence Operations analysts examine real-world e-mail traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global e-mail security threats and trends. Cisco will continue to monitor this threat and automatically adapt IronPort systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco IronPort Virus Outbreak Filters protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. E-mail that is managed by Cisco and end users who are protected by Cisco IronPort web security appliances will not be impacted by these attacks. Cisco IronPort appliances are automatically updated to prevent both spam e-mail and hostile web URLs from being passed to the end user.

Related Links
Cisco Security Intelligence Operations
Cisco Threat Operations Center
Cisco SenderBase Security Network
 
Alert History
 

Version 8, November 20, 2012, 7:08 AM: Cisco Security Intelligence Operations has detected significant activity on November 19, 2012.

Version 7, November 19, 2012, 9:58 AM: Cisco Security Intelligence Operations has detected significant activity on November 17, 2012.

Version 6, November 16, 2012, 6:56 AM: Cisco Security Intelligence Operations has detected significant activity on November 16, 2012.

Version 5, November 13, 2012, 8:57 AM: Cisco Security Intelligence Operations has detected significant activity on November 13, 2012.

Version 4, November 12, 2012, 11:59 AM: Cisco Security Intelligence Operations has detected significant activity on November 12, 2012.

Version 3, November 12, 2012, 11:15 AM: Cisco Security Intelligence Operations has detected significant activity on November 12, 2012.

Version 2, November 9, 2012, 10:24 AM: Cisco Security Intelligence Operations has detected significant activity on November 9, 2012.

Version 1, November 9, 2012, 11:38 AM: Cisco Security Intelligence Operations has detected significant activity on November 9, 2012.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldThreat Outbreak Alert Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield