At 4:30 PM +0300 10/15/09, Jari Fredriksson wrote:
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="=_6GorA2txt0CVliaTmJuBPNhCIqDzZA"
Content-Disposition: inline


Undetected IRS scam variant.

http://www.iki.fi/jarif/malware/tax-statement.exe

--
http://www.iki.fi/jarif/


"You don't have permission to access /~jarif/ikipage/malware/tax-statement.exe
on this server." :-(

Also to you have link url to that samples as well. But that should have been detected than winnow.malware.ts.irs.1.UNOFFICIAL unless they changed their attack vector.

Tom

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to