new malware bypass MailScanner filename rules !
ezwww
info at ezwww.ch
Wed Mar 30 09:27:05 UTC 2016
hi,
since two months I block attachments successfully .js content in .zip
(with filename rule).
Since this night new JS/malware (subject "Bill N-xxxx" or "recent bill")
bypass this rule !
It's a problem with mime header, body malformed that allowed to pass
MailScanner ?
two examples :
---------------------------------------------------------------------
Received: from 85.105.40.171.static.ttnet.com.tr
(85.105.40.171.static.ttnet.com.tr [85.105.40.171] (may be forged))
....
From: Rueben Fletcher <FletcherRueben9352 at ttnet.com.tr>
Content-Type: multipart/mixed;
boundary="Apple-Mail=_31ABD19B-909E-3C06-CDC8-B14649A4772C"
X-Smtp-Server: 076E5E4B-6F12-237D-20F1-7849FBD4C6C5
Subject: recent bill
Message-Id: <6DDE5CD3-4656-843B-EAFC-9C302B4F5339....>
X-Universally-Unique-Identifier: 072FB36F-AF92-218E-6949-5E387A758EF4
Date: Wed, 30 Mar 2016 12:12:08 +0300
To: xxxxx
Mime-Version: 1.0 (Mac OS X Mail 9.3 (3124))
--Apple-Mail=_31ABD19B-909E-3C06-CDC8-B14649A4772C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset=utf-8
Dear xxxx,
Please see attached file regarding clients recent bill. Should you need =
further assistances lease feel free to email me.
Best regards
Rueben Fletcher
Head of Maintenance
--Apple-Mail=_31ABD19B-909E-3C06-CDC8-B14649A4772C
Content-Disposition: inline; filename="xxxxx_document_003F11.zip"
Content-Type: application/x-rar-compressed; x-unix-mode=0600;
name="xxxxx_document_003F11.zip"
Content-Transfer-Encoding: base64
.....
--Apple-Mail=_31ABD19B-909E-3C06-CDC8-B14649A4772C--
---------------------------------------------------------------------
Received: from dsl-189-244-210-183-dyn.prod-infinitum.com.mx
(dsl-187-156-82-128-dyn.prod-infinitum.com.mx [187.156.82.128] (may be
forged))
...
From: Frances Camacho <CamachoFrances586 at nssoluciones.com>
Content-Type: multipart/mixed;
boundary="Apple-Mail=_4E9A492D-B205-2586-D525-1CB0B2AC2799"
X-Smtp-Server: 616C7611-9CEC-92CA-D751-C8A44FF50C5F
Subject: Bill N-2EC51C
Message-Id: <59C028F2-B1C8-60FE-D87A-DEAF3ECAA103....>
X-Universally-Unique-Identifier: 13825021-3DDE-FCF8-6985-BF5841859B69
Date: Tue, 29 Mar 2016 19:11:48 -0500
To: xxxx
Mime-Version: 1.0 (Mac OS X Mail 9.3 (3124))
--Apple-Mail=_4E9A492D-B205-2586-D525-1CB0B2AC2799
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset=utf-8
Dear xxxx,
Please check the bill in attachment.
In order to avoid fine you have to pay in 48 hours.
Best regards
Frances Camacho
Sales Director
--Apple-Mail=_4E9A492D-B205-2586-D525-1CB0B2AC2799
Content-Disposition: inline; filename="28F59_xxxxx_2EC51C.zip"
Content-Type: application/zip; x-unix-mode=0600;
name="28F59_xxxx_2EC51C.zip"
Content-Transfer-Encoding: base64
....
--Apple-Mail=_4E9A492D-B205-2586-D525-1CB0B2AC2799--
---------------------------------------------------------------------
The antivirus detect the javascript file in attachment
Sophos: >>> Virus 'Mal/JSDldr-B' found in file
./28F59_xxxx_2EC51C.zip/scan/f385230/e5ab2a96.js
Thanks for your help.
ezwww
More information about the MailScanner
mailing list