
SonicWALL UTM Research team observed a new wave of the Postcard spam campaign during last three days.
The email pretends to arrive from 123Greetings.com and contains an e-card as an attachment. The e-mail attachment is a ZIP archive that contains the new FakeAV Trojan variant.
The e-mail looks like:
Subject: You've received a postcard
Attachment: ecard.zip (contains ecard.exe)
Email Body:
------------------------
Good day.
Your family member has sent you an ecard from 123greetings.com.
Send free ecards from 123greetings.com with your choice of colors, words and music.
Your ecard will be available with us for the next 30 days.
If you wish to keep the ecard longer, you may save it on your computer or take a print.
To view your ecard, open zip attached file.
------------------------
The e-mail message looks like below:
The e-mail body remained the same but the attachment payload kept changing every few hours in last 3 days. SonicWALL has received more than 50,000 copies of this spam e-mails till now which had more than five distinct attachment payloads.
The malicious executable inside the attachment looks like:
If the user downloads and executes the attached ecard, it performs following activities:
The Trojan is also known as W32/FakeRean.A , Rogue:W32/Agent.MCF , and Generic FakeAlert!cr .
SonicWALL Gateway AntiVirus provided proactive protection against multiple variants of this malware via GAV: Kryptik.ASA_2 (Trojan) signature .
Share This Article

An Article By
An Article By
Security News
Security News