Alerts left arrow     right arrow

Virus Email - Adobe Services Invoice or Adobe Payment Required

Edit
Virus Email - Adobe Services Invoice or Adobe Payment Required

The email message below with the subject: "Adobe Services Invoice," or "Urgent Invoice Attached" or "Adobe | Payment Required," has malicious Microsoft Word document attached that will infect your Windows computer if you open it. The message was NOT sent by Adobe and was designed to trick the recipients into opening the malicious attachment, disguised as an invoice. So, if you receive the same email message, please do not attempt to open the attachment.

Please continue below.

The Virus Email Message

Subject: Adobe Services Invoice, Urgent Invoice Attached, Adobe | Payment Required

Attachment: invoice.doc

Hello,

Thank you for choosing adobe services.

Please see your attached invoice.

Adobe Billing Department
Adobe Systems Incorporated
21 Hickory Drive

The attachment "invoice.doc" is a Microsoft Word document that contains a malicious Macro, which will attempt to download the malicious program "dro.exe" from the malicious or malware website: www.chinamansteve.com, and install it on your computer as "crss.exe", if you open the attachment and enable Macro, 'Content' or 'Editing' in Microsoft Word.

In other words, the file will be downloaded from:

http://chinamansteve.com/dro.exe

to the following location on your computer:

C:\Users\Public\Documents\crss.exe

A Macro is a set of computer instructions that you can record in Microsoft Office.

Once the malicious program is installed, it will attempt to download the following malicious files:

  • www.chinamansteve.com/proxy3.exe
  • www.chinamansteve.com/moneyz.exe

We found the following threats after scanning all of the malicious file:

  • W97M/Downloader.U
  • Downloader/Agent
  • MO97:Downloader-EF
  • VBA/TrojanDownloader.Agent.AM
  • Trojan-Downloader.MSWord.Agent
  • Trojan-Downloader.MSWord.Agent.ap
  • Exploit-FMD!A88C841E8983
  • TrojanDownloader:W97M/Agent

The cybercriminals behind these malicious email messages aims are to trick the curious recipients into opening the malicious attachment that will infect their computers with a virus or Trojan horse.

Once your computer has become infected with this malicious Trojan horse, the cybercriminals behind this email message will be able to access and take control of your computer remotely from anywhere around the world. They may spy on you, use your computer to commit cybercrimes, or steal your personal and financial information.

Now, if you have already opened anyone of the malicious attachment, please do a full scan of your computer with the antivirus software installed on it.

If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.

Never enable Macro, enable 'Content' or enable 'Editing' when opening a Microsoft Office document that you have received from an unknown person or source. This will prevent a malicious Macro virus embeded in the document from infecting your computer.

Click here for a list of email attachments you should never open, regardless of where they came from.

For a list of other virus email messages, please click here.

Please share with us what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward malicious or phishing email messages to us at the following email address: info@onlinethreatalerts.com .

Comments, Questions and Reviews

Comment(Total: 0)

Write a Comment, Review, or ask a Question or scroll down to view comments, reviews and questions made by others.

Would you recommend this article to a friend or family member?
Yes (1) No (0)   

Write Your Comment, Question or Review

Write your comment, question or review in the box below to share what you know or to get answers.
All comments, questions or reviews will be examined for derogatory or indecent statements, spam or malicous code, before they are posted on this website.


More for you:
Warning! JavaScript is turned off or disabled! Some features on this website will not work.