
--Updated March 27, 2009---
SonicWALL UTM Research team saw a third wave of DHL Tracking number invoice spam with different attachment payloads starting late afternoon on March 26, 2009.
SonicWALL Gateway Antivirus provides protection against this new wave via GAV: Zbot.JJP (Trojan) signature. Total Signature hits recorded since yesterday - 872,128 hits (Signature statistics image below)
------------------------------------------------
--Updated March 26, 2009---
SonicWALL UTM Research team saw a new wave of DHL Tracking number invoice spam with different attachment payloads starting March 25, 2009.
SonicWALL Gateway Antivirus provided proactive protection against this new wave via GAV: Suspicious#waledac.8 (Worm) signature that was released on March 9, 2009. Total Signature hits recorded since yesterday - 576,942 hits (Signature statistics image below)
------------------------------------------------
--Original publish date: March 23, 2009---
SonicWALL UTM Research team observed a new wave of the on-going Tracking number invoice spam campaign starting Sunday, March 22, 2008. The email has a zip archived attachment which contains the new Buzus Trojan variant.
SonicWALL has received more than 1,700 e-mail copies of this malware till date. The e-mail looks like following:
Attachment: DHL_DOC.zip (contains DHL_DOC.exe)
Update :
Attachment: DHL_HELP.zip (contains DHL_HELP.exe)
Update :
Attachment: dhl_n756512.zip (contains dhl_n756512.exe)
Subject: DHL Tracking number #
Email Body:
------------------------
Hello!
We were not able to deliver postal package you sent on the 14th of March in time because the recipient’s address is not correct.
Please print out the invoice copy attached and collect the package at our office.
Your personal manager: Nathan Lund,
Customer Service: 1-800-CALL-DHL
Fax: 888-221-6211
DHL International, Ltd. All Rights Reserved.
------------------------
Update : The executable file inside the zip attachment in the new wave has an icon disguised as a Microsoft Help file and it looks like following:
The executable file inside the zip attachment has an icon disguised as a Microsoft Word document file and it looks like following:
Update : A screenshot of a sample e-mail for the third wave is shown below:
Update : A screenshot of a sample e-mail for the second wave is shown below:
A screenshot of a sample e-mail is shown below:
The Trojan when executed performs following host level activity:
It modifies the following Registry key for running sdra64.exe on system reboot:
It also tries connect and download an encrypted configuration file from the following URL:
The Trojan is also known as DR/Delphi.Gen , trojan W32/Trojan3.AIY , and VirTool:Win32/DelfInject.gen!J
SonicWALL Gateway AntiVirus provides protection against this malware via GAV: Buzus.ARQX (Trojan),GAV: Suspicious#waledac.8 (Worm) and GAV: Zbot.JJP (Trojan) signatures.

Share This Article

An Article By
An Article By
Security News
Security News