Home Malware Blank ‘Business Card’ Emails Contain JavaScript Malware in Attachment

Blank ‘Business Card’ Emails Contain JavaScript Malware in Attachment

by Brett M. Christensen

Outline:
Email with the subject line ‘Business Card’ and no content in the body includes an attached .zip file.



Brief Analysis:
The attached file does not contain a business card as implied by the subject line. Opening the .zip file reveals a malicious JavaScript (.js) file that, if opened, can download and install malware.

Example:
Subject: Business Card

[Blank Body]

Attachment: IMG_1670.ZIP

Business Card Malware Email




Detailed Analysis:
Sometimes, even the simplest of tricks can be effective.  In this case, cybercrooks have sent out a malicious email that has no text at all in the body but has the subject line ‘Business Card’.  The email includes an attached .zip file called ‘IMG_1670’.  The implication is that the attached file contains a harmless business card.

Recipients who are still naive to the nefarious ways of the Internet may open the attachment out of simple curiosity. Inside the .zip file, they will find another ‘IMG’ file with the extension ‘.js’. The .js extension means that the file is a JavaScript.  But, if the JavaScript file is opened, it may download and install a version of the Dridex trojan.  Once installed, the trojan can harvest online banking credentials and other sensitive personal information from the infected computer and send it to the criminals. Alternatively, malicious JavaScript attachments like this one may download and install Locky Ransomware.

Details such as the supposed sender, the attachment name, and the purpose of the malware payload may vary in different versions of these emails.

If you receive one of these blank ‘Business Card’ emails, do not open any attachments or click any links that it contains.




Last updated: April 19, 2016
First published: April 19, 2016
By Brett M. Christensen
About Hoax-Slayer

References
Business Card – JS malware leads to Dridex
Fake ‘Order Status’ Emails Contain Locky Malware
Malware Threat Articles

 

Importance Notice

After considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.

These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.

Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.

And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.

When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.

I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.

A Big Thank You

I would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.

I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.

Closing Date

Hoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.

Thank you, one and all!

Brett Christensen,
Hoax-Slayer