Starting about two hours ago, about 40% of my real-time
honeypot spam is a new malware campaign.  About a third are
hitting "BAYES_00", with about 10% of all having negative SA
scores. :(

Full spample (with munged email addresses):
        http://puffin.net/software/spam/samples/0040_mal_tgz.txt
That's not a valuable honeypot address, so I've left everything
else as-is, including the Message-ID.

So far, all of these have the _EXACT_ same Message-ID, From,
and Reply-To.  I expect all to change, but they may be useful
for quick block rules.  The From account is "FSPRD" and the 
>From base domain is "covance".

The filenames are all the same length, pure numeric with three
leading zeroes.  Here's a few examples:
        0006449538.tgz
        0007184777.tgz
        0008205464.tgz
        0007565676.tgz
        0008113861.tgz
        0001457696.tgz
        0007535057.tgz
        0008403752.tgz
        0009470013.tgz


I'm blocking these by file extension (both ".tgz" and ".gz" to
be extra cautious).
A couple of years ago, I added a "mime prefix" rule to my post-SA
filter, and have added rules using that, in case the spammers try
the old trick of asking victims to rename the file.

I tried opening a benign ".gz" in Windows7, and it didn't
recognize it, but other versions may.  These may be targeting
other platforms (e.g. I recently learned that Chrome OS has native
support for "rar" extraction, which may explain the recent rise of
rar javascript email malware).

I've only taken a quick look at the payload.  It's javascript, but
definitely different from past campaigns.

I've been seeing a high level of "calibration" spam for over a
week, so I suspect this is a new botnet going live. :(
        - "Chip"

Reply via email to