![]() ![]() ![]() Once executed, the sample starts listening on port 7499. Sample screenshot of the spamvertised email:ĭetection rate for the malicious attachment – MD5: 74cff87704aec030d7ad1171366aff87 – detected by 8 out of 46 antivirus scanners as UDS: PWSZbot-FBX!74CFF87704AE. Users can become infected by either executing the attachment or by clicking on the client-side exploits serving link found in the emails. What’s particularly interesting about this campaign is that the cybercriminal(s) behind it are mixing the infection vectors by relying on both a malicious attachment and a link to the same malware found in the malicious emails. A currently ongoing malicious spam campaign is attempting to trick users into thinking that they’ve successfully received a legitimate ‘Gift Card’ worth $200.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |