
SonicWALL UTM Research team received reports of a new spam campaign pretending to be arriving from Facebook abuse Department spreading in the wild. It involves the new variant of Oficla Trojan that SonicWALL blocked as GAV: Oficla.MME. This worm also downloads component files including mass mailer, info-stealer and FakeAV malware.
The sample e-mail format of the spam campaign includes the following:
Subject:
Attachment: Attached_SecurityCode{Random Numbers}.zip
If the user downloads and executes the malicious executable inside the zip attachment, it performs the following activity:
Downloads other malware:
Dropped files:
Added Registry:
Network Activity:
HTTP GET Requests:
HTTP POST Requests:
This worm downloads a malware component that steals information from the system. It sends those information to this URL:
DNS Requests:
Mass Mailer
Checks connectivity to SMTP servers by querying MX records as show below:
Collects e-mail addresses but ignores addresses with the following strings:
Information Stealing
Steals credentials from the following applications:
FTP Clients:
Web Browser
IM Clients
Mail Clients
Others
FakeAV
After Clicking the "Scan Online" Button, it will show this message and prompts for rebooting the system:
After rebooting the system, the following FakeAV screens will appear. It will then ask the user to pay for the software to completely clean the system.
SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News