Over the past couple of days, cybercriminals have launched yet another massive spam campaign, once again targeting U.K users. This time, they are impersonating Vodafone U.K, in an attempt to trick its customers into executing a bogus MMS attachment found in the malicious emails. Upon execution, the sample opens a backdoor on the affected hosts, allowing the cybercriminals behind the campaign complete access to the affected PC.

More details:

Sample screenshot from the spamvertised email:

Sample detection rate for the malicious attachment: MD5: 3ce2b9522a476515737d07b877dae06e – detected by 36 out of 44 antivirus scanners as Trojan-Downloader.Win32.Andromeda.coh.

Upon execution, the sample creates %AllUsersProfile%svchost.exe on the host. It also creates a Registry Value – [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] -> SunJavaUpdateSched = “%AllUsersProfile%svchost.exe” so that svchost.exe starts evert time Windows starts.

Webroot SecureAnywhere users are proactively protected from this threat.

You can find more about Dancho Danchev at his LinkedIn Profile. You can also follow him on  Twitter.

Blog Staff

About the Author

Blog Staff

The Webroot blog offers expert insights and analysis into the latest cybersecurity trends. Whether you’re a home or business user, we’re dedicated to giving you the awareness and knowledge needed to stay ahead of today’s cyber threats.

Share This