{"id":11116,"date":"2022-04-09T16:21:37","date_gmt":"2022-04-09T16:21:37","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?p=11116"},"modified":"2022-04-09T16:21:37","modified_gmt":"2022-04-09T16:21:37","slug":"bill-for-documents-57608-28-09-2016-malspam-delivers-locky-odin","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/bill-for-documents-57608-28-09-2016-malspam-delivers-locky-odin\/","title":{"rendered":"Bill For Documents 57608-28-09-2016 Malspam Delivers Locky \u2013 Odin"},"content":{"rendered":"

I woke up to another overnight mass malspam run of the never ending series of Locky downloaders with a series of blank \/ empty emails with the basic subject of Bill for documents 57608-28-09-2016 pretending to come from from no reply @ random companies, with a semi- random named .rar attachment containing a .JS file. These are using the new Odin file extension on the encrypted files.<\/p>\n

This looks quite different to previous versions of Locky \/ Odin that I have ben seeing recently. The MALWR<\/strong> (https:\/\/malwr.com\/analysis\/YmI0YzExZGVjZTcxNGJmOTllMzAxMzQ1ZWMyYWMyNWQ\/) report shows contact with and attempted download of Net framework and some sort of mapping ( possibly Google earth) . Now I don\u2019t know it that is because MALWR is running in A VM \/sandbox and tries to update itself to install & use needed components or whether Locky has changed to try to download what it can\u2019t find on the victim computer<\/p>\n

The subjects vary with each email .They all start with bill for and either documents , paper or parcel the a series of random numbers and the date, looking something like :<\/p>\n