Re: new(ish) malware: RTF with MIME payload

2016-05-05 Thread Chip M.
Thanks guys, for all the helpful info and sanity checks! :) Sorry about the Message-ID munging - I get some really useful malware at that domain but no ham, and am a bit paranoid about losing that feed. Followup: >I had considered anchoring the MIME string, however we have a >very powerful

Re: new(ish) malware: RTF with MIME payload

2016-03-21 Thread RW
On Sun, 20 Mar 2016 21:22:52 + Cedric Knight wrote: > > Anything that opens in MS Word, eg do[ct][mx]?, asd, wbk, wll and > > might run VBA, so includes Excel too, xl.* - whether it launches > > depends how the MUA handles the Content-Type I think - so > > "application/.*" . > > On

Re: new(ish) malware: RTF with MIME payload

2016-03-20 Thread Cedric Knight
On 18/03/16 08:39, Cedric Knight wrote: > On 17/03/16 19:31, Chip M. wrote: >> Starting about two hours ago, more than 80% of my real-time >> honeypot spam is a new malware campaign. >> >> Full spample (with redacted/munged email addresses and >> Message-ID): >>

Re: new(ish) malware: RTF with MIME payload

2016-03-19 Thread Jari Fredriksson
Joseph Brennan kirjoitti 18.3.2016 18:48: Today's version has a Subject of this form: FW: Notification from WORD WORD ...where WORD WORD varies per message but is always all caps. The three Content-Type lines Chip mentioned are the same, and they are the only ones that should be used for rtf.

new(ish) malware: RTF with MIME payload

2016-03-19 Thread Chip M.
Starting about two hours ago, more than 80% of my real-time honeypot spam is a new malware campaign. Full spample (with redacted/munged email addresses and Message-ID): http://puffin.net/software/spam/samples/0039_mal_rtf_mime.txt This is a variation on an XML file malware campaign that

Re: new(ish) malware: RTF with MIME payload

2016-03-19 Thread Joseph Brennan
Today's version has a Subject of this form: FW: Notification from WORD WORD ...where WORD WORD varies per message but is always all caps. The three Content-Type lines Chip mentioned are the same, and they are the only ones that should be used for rtf. The name is similar, repeating the same

Re: new(ish) malware: RTF with MIME payload

2016-03-19 Thread Reindl Harald
Am 18.03.2016 um 09:39 schrieb Cedric Knight: On 17/03/16 19:31, Chip M. wrote: On 17/03/16 19:46, Reindl Harald wrote: /var/www/uploadtemp/8044012e4e9b882b3c7643489c05df73e5cf6dcf.eml: Sanesecurity.Malware.26034.XmlHeurGen.AM.UNOFFICIAL FOUND Yes, Sanesecurity is great... this detects

Re: new(ish) malware: RTF with MIME payload

2016-03-18 Thread Jari Fredriksson
Jari Fredriksson kirjoitti 18.3.2016 18:56: Joseph Brennan kirjoitti 18.3.2016 18:48: Today's version has a Subject of this form: FW: Notification from WORD WORD ...where WORD WORD varies per message but is always all caps. The three Content-Type lines Chip mentioned are the same, and they

Re: new(ish) malware: RTF with MIME payload

2016-03-18 Thread Cedric Knight
On 17/03/16 19:31, Chip M. wrote: > Starting about two hours ago, more than 80% of my real-time > honeypot spam is a new malware campaign. > > Full spample (with redacted/munged email addresses and > Message-ID): > http://puffin.net/software/spam/samples/0039_mal_rtf_mime.txt [snips] > So far,

Re: new(ish) malware: RTF with MIME payload

2016-03-18 Thread Reindl Harald
Am 17.03.2016 um 20:31 schrieb Chip M.: The Subjects are all currently of the form: Invoice MKINV43197 from Tip Top Delivery Where "MKINV43197" matches the token in the filename. So far, they all have these headers: X-Interface: IDSMail OLE Server v6.12 (32) X-Mailer: