Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: SANS Internet Storm Center SANS ISC InfoSec Forums

Watch ISC TV. Great for NOCs, SOCs and Living Rooms:

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
New email virus making the rounds
We are currently analyzing a copy of .. something.  Attachment name "", detection by AV is still thin to nonexistent. When run, the code tries to pull additional files from web servers in Russia, so if you have a chance, you might consider blocking the following TLDs on your proxy / perimeter:  /  / / /

UPDATE 2200UTC: contains a file named "Secure E-mail File.hta", which is according to current Virustotal output only detected by Panda and Kaspersky, the latter calls it Worm.Win32.Feebs.k . Samples we've seen come in an email with subject "Secure Message from user". The HTA file is nicely obfuscated, it has 2 obfuscation functions, one being easy unescape, while the other one is a bit more complex. Once it is executed by a user, it will run in the local zone, so it can use various ActiveXObjects. It will try to download executables from 5 web sites (domains listed above), all of which are up and working at this moment.

MD5 sums for the original exploit file and the two variants of EXEs it downloads when run:
7eb24b4c7b7933b6a0157e80be74383c  Secure E-mail File.hta
9cbd9710087bff6f372b1e3f652d8f7c  feebs1.exe
983bf330aae51535c7382dc82429364b  feebs2.exe

Analysis and write-up by fellow handler Bojan Zdrnja. Thanks! :)


Most of the AV vendors are now detecting this as another variant of the Feebs family. Here are links to couple of descriptions:

Symantec (W32.Feebs.[D|E]@mm):

Trend Micro (JS_FEEBS.M):

F-Secure (Feebs):

Thanks to Juha-Matti and Danny Goodman  for sending information about this!


385 Posts
ISC Handler
Jan 11th 2006

Sign Up for Free or Log In to start participating in the conversation!