Home Malware Bogus ‘Price List’ Email Contains Malware

Bogus ‘Price List’ Email Contains Malware

by Brett M. Christensen

Email claims that you can view a price list by opening an attached file and advises you to contact ‘your local ITT office’ for additional information.

Brief Analysis:
The email’s attachment does not contain a price list. Instead, the attached .zip or .rar file harbours a malicious Javascript (.js) file that, if opened, can download and instal malware.

Subject: Price list

Thank you. Our latest price list is attached. For additional information, please contact your local ITT office.

Price List Malware Email

Detailed Analysis:
This email, which has the subject line ‘Price List’, claims that you can view ‘our latest price list’ by opening an attached file. The email suggests that, if you need additional information, you should contact your local ITT office. The email has an attached .zip or .rar file.

However, the email is not from any ‘ITT office’ and the attachment does not contain a price list. Unzipping the attachment will reveal a JavaScript (.js) file. If you click this file in the hope of seeing the supposed price list, the JavaScript will contact a web server and download and install malware on your computer.

Malicious Javascript attachments are being used in an ongoing series of recent malware attacks. Often, the JavaScript downloads and installs Locky ransomware.  Once installed, Locky encrypts your files and then demands that you pay a ransom to cybercriminals to get an unlock key. In other cases, the JavaScript may download malware components that can steal sensitive information such as bank login credentials from the infected computer.

Details, such as the name of the sender and the attachment name, may vary in different versions of these bogus ‘Price List’ emails.

If you receive one of these emails, do not click any links or open any attachments that it contains. No legitimate entity is ever likely to send a business document such as a price list in the form of an attached JavaScript file.

Last updated: April 29, 2016
First published: April 29, 2016
By Brett M. Christensen
About Hoax-Slayer

Malware spam: “Thank you. Our latest price list is attached. For additional information, please contact your local ITT office.”
Fake ‘Order Status’ Emails Contain Locky Malware
“Locky” ransomware – what you need to know


Importance Notice

After considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.

These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.

Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.

And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.

When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.

I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.

A Big Thank You

I would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.

I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.

Closing Date

Hoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.

Thank you, one and all!

Brett Christensen,