We are currently analyzing a copy of .. something. Attachment name "message.zip", detection by AV is still thin to nonexistent. When run, the code tries to pull additional files from web servers in Russia, so if you have a chance, you might consider blocking the following TLDs on your proxy / perimeter:
1gb.ru / t35.com / hzs.nm.ru / users.cjb.net / h16.ru
UPDATE 2200UTC: message.zip contains a file named "Secure E-mail File.hta", which is according to current Virustotal output only detected by Panda and Kaspersky, the latter calls it Worm.Win32.Feebs.k . Samples we've seen come in an email with subject "Secure Message from HotMail.com user". The HTA file is nicely obfuscated, it has 2 obfuscation functions, one being easy unescape, while the other one is a bit more complex. Once it is executed by a user, it will run in the local zone, so it can use various ActiveXObjects. It will try to download executables from 5 web sites (domains listed above), all of which are up and working at this moment.
MD5 sums for the original exploit file and the two variants of EXEs it downloads when run:
7eb24b4c7b7933b6a0157e80be74383c Secure E-mail File.hta
Analysis and write-up by fellow handler Bojan Zdrnja. Thanks! :)
Most of the AV vendors are now detecting this as another variant of the Feebs family. Here are links to couple of descriptions:
Trend Micro (JS_FEEBS.M):
Thanks to Juha-Matti and Danny Goodman for sending information about this!
Jan 11th 2006
Jan 11th 2006
1 decade ago