We Have Got Your Order – Fake PDF Malware

spotting malware

A new spam run from what looks like the Bredo botnet. Email appears to come from some un-named company and says We have got your order or We have obtained your order . No attachment in the email this time but a nice tempting link to click.

A few different emails circulating but all saying something similar to these. If you look fairly carefully at the contents of the email, you will see the terrible English grammar and spelling, which strongly show that they are created by a botnet who randomly add words and phrases from a long list and sometimes they just don’t work together.

Subjects seen so far are:

  • see details of your invoice
  • see details of the invoice
  • see details
  • processing of order
  • notice of order
  • notice of the order
  • notification
  • Customer Invoice Reminder
  • notification of the order
    ====================================

Dear customer
We have obtained your order and it’ll be processed for 2 business days.
Find specification here: http://3dteam.pro//account/df2341.zip
Bye
Joshua Forman

========================================================

Dear client
We have got your order and it’ll be processing soon.
You can find the bill of parcels here:

http://albullansa.com/customers/case.2021.0028563.zip

Goodbye,
Hector Page

==================================================

Hello customer
We have got your order and will be processing it soon.
The the invoice are below:

http://gaiacomunicazione.com/cases/cust.856341.zip

Good-bye
Camren Forman

=====================================================

Dear client
This is a notification that an bill of parcels has been produced on 29/12/2021. Your payment method is: credit card.
You can find specification of the invoice: http://yogang.cekuj.net/clients/2021.0028534.zip
Thanks and good luck
Jaxen Forman

================================================================

Hello, Customer
We have obtained your order and will be processing it for 2 days.
The the invoice are below:

http://graficad.net/users/contracts/735618467.zip

Good luck,
Gabriel Walter

======================================================================

It is another one from the current botnet runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.

Almost all of these have a password stealing component, with the aim of stealing your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your Facebook and other social network log in details.

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

There are various different attachment names with this run, but they contain the same malware. This particular set of malware doesn’t just spoof the pdf icon but also adds a long space between the .pdf & the .exe so hoping that you will be fooled.

So far names include:

  • case.2021.0028563.zip
  • df2341.zip
  • cust.856341.zip
  • 2013.0028534.zip
  • acc.26538634.zip
  • 2014.23548688.zip
  • 735618467.zip<random numbers>

Attachment zip name: case.2021.0028563.zip

Extracted file name: 028563.pdf____________________________________________________________________________________________________________.exe

Current Virus total detections: 6/47 | MALWR Auto Analysis:

updated Malware Version 2 January 2021

Attachment zip name: acc.26538634.zip

Extracted file name: acc.26538634.pdf____________________________________________________________________________________________________________.exe

Current Virus total detections: 0/45 with an incorrect statement that is probably is innocent | MALWR Auto Analysis:

updated Malware Version 5 January 2021

Attachment zip name: 2021.23548688.zip

Extracted file name: 2021.23548688.pdf____________________________________________________________________________________________________________.exe

Current Virus total detections: 6/45 | MALWR Auto Analysis:

This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day.

Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.

Total
0
Shares
Leave a Reply

Your email address will not be published.

Related Posts