2020-03-23 - POLISH MALSPAM WITH XLS ATTACHMENT PUSHES URSNIF (GOZI/IFSB/DREAMBOT)
- 2020-03-23-Ursnif-IOCs.txt.zip 1.1 kB (1,066 bytes)
- 2020-03-22-example-of-Polish-email-pushing-Ursnif.eml.zip 68 kB (68,005 bytes)
- 2020-03-23-Ursnif-infection-traffic.pcap.zip 957 kB (957,263 bytes)
- 2020-03-23-Ursnif-malware-and-artifacts.zip 3.0 MB (2,964,146 bytes)
- All zip archives on this site are password-protected with the standard password. If you don't know it, see the "about" page of this website.
Shown above: Screenshot of the malspam.
Shown above: Screenshot of the attached XLS spreadsheet.
Shown above: Traffic from an infected Windows host.
Shown above: DLL file retrieved after enabling the Word macro.
Click here to return to the main page.