IT Calendar

  4/14/19 - 4/20/19  
Prev April 2019 Next
Sun Mon Tue Wed Thu Fri Sat
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
Back to This Week


Threat Outbreak Alert: Subject with Link E-mail Messages

Cisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that appear to come from a personal user e-mail account.  The subject of the e-mail is just a number and the message body contains only a link.  The link directs the recipient's browser to download the file surprise.exe.  When executed, this file attempts to infect the user's system with malicious code.

E-mail messages that are related to this threat (RuleID2283) may contain a link to the file surprise.exe.

The surprise.exe file has a file size of 24,064 bytes. The MD5 checksum, which is a unique identifier of this executable file, is the following string: 0xBE712C4A1BB14317C19C5DBED3438A79

The following text provides samples of the e-mail messages that are associated with this threat outbreak:

Subject Line: 0,9604228

Message Body:  hxxp:// 0.8283419

The  malicious code associated with this threat outbreak shares the characteristics of a downloader trojan.  The trojan attempts to establish connections to the and domains.  The trojan then requests a page that directs the user's browser to download the files file.exe and 161.exe, which contain additional malicious code.  The new code creates the files qmgr0.dat, qmgr1.dat, asd.bat, and ieocx.dll.  Additionally, the trojan terminates the Security Center service.  The trojan also uses the Background Intelligent Transfer Service to create a task that issues a GET request to the domain for the file videosz.php.

Cisco Security Intelligence Operations analysts examine real-world e-mail traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global e-mail security threats and trends. Cisco will continue to monitor this threat and automatically adapt IronPort systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco IronPort Virus Outbreak Filters protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. E-mail that is managed by Cisco and end users who are protected by Cisco IronPort web security appliances will not be impacted by these attacks. Cisco IronPort appliances are automatically updated to prevent both spam e-mail and hostile web URLs from being passed to the end user.

Read More Visit Website
Central State University
Top of Page | Back to Home
Posted by the Cisco Security Center
Apr 3, 2009 - 11:06:00 AM

Faculty and Staff Web mail Faculty & Staff Webmail

Leader Alert System
Leader Alert System

my C.S.U.
MyCSU: Student Email

Central State University prohibits the use of any of its registered symbols, insignia, or other identifying marks without express written approval.
Central State University
Information Technology
1400 Brush Row Rd.
Wilberforce, Ohio 45384
Phone: (937) 376-6476
Fax: (937) 376-6475
Email: Contact Us
Academics | Alumni & Friends | Athletics | Current Students | Faculty & Staff | Prospective Students

Central State University prohibits the use of any of its registered symbols, insignia, or other identifying marks without express written approval. Read More