NON APRITE LA FALSA E-MAIL DELLA MICROSOFT CHE STA ARRIVANDO IN QUESTI GIORNI !
DA : Microsoft Customer Service” <customerservice@microsoft.com>
OGGETTO : Security Update for OS Microsoft Windows
SEGUE TESTO E ALLEGATO DI 33 KB
QUESTA E-MAIL E’ ASSOLUTAMENTE FALSA E DANNOSA GLI AUTORI DELLA MAIL IN OGGETTO HANNO UTILIZZATO UN SERVER NELLA REPUBBLICA CECA, NULLA A CHE FARE CON I SERVER MICROSOFT.
ALLEGO TESTO E-MAIL :
Dear Microsoft Customer,
Please notice that Microsoft company has recently issued a Security Update for OS Microsoft Windows. The update applies to the following OS versions: Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows Millenium, Microsoft Windows XP, Microsoft Windows Vista.
Please notice, that present update applies to high-priority updates category. In order to help protect your computer against security threats and performance problems, we strongly recommend you to install this update.
Since public distribution of this Update through the official website http://www.microsoft.com would have result in efficient creation of a malicious software, we made a decision to issue an experimental private version of an update for all Microsoft Windows OS users.
As your computer is set to receive notifications when new updates are available, you have received this notice.
In order to start the update, please follow the step-by-step instruction:
1. Run the file, that you have received along with this message.
2. Carefully follow all the instructions you see on the screen.
If nothing changes after you have run the file, probably in the settings of your OS you have an indication to run all the updates at a background routine. In that case, at this point the upgrade of your OS will be finished.
We apologize for any inconvenience this back order may be causing you.
Thank you,
Steve Lipner
Director of Security Assurance
Microsoft Corp.
—–BEGIN PGP SIGNATURE—–
Version: PGP 7.1
0849JB5RD2VW1QL4NWFGQUL1LDPE49EPZHWG85DIC99Z9CZ9Z7SR9J7JLD1FY61TJ
6NXM1VC8DTKWAI9PSPH9T8SD2JSPH1L0EL8M968TUEHSG5UFTHUQUD95RNU3DKRQ6
4FO81Y6QTTK452ORNUVXKI8HB8TU0N4F1TGWVJ9KQQ8W3UNG2VV3AN5Q7GZVQ2PFF
B87089F03JDELY8ZJ11XUF7NILGF8D8S9QT14YS2LYLMVM478NDMDNK4H263S8KIC
66UB1N5V47OLP117AAZVQUZ9TE966UDXJFK==
—–END PGP SIGNATURE—–
SEGUE ANALISI DETTAGLIATA VIRUS
AhnLab-V3 | – | – | Win-Trojan/Goldun.33398.B |
AntiVir | – | – | TR/Drop.HeadJoe.N |
Authentium | – | – | W32/Trojan3.CI |
Avast | – | – | Win32:Trojan-gen {Other} |
AVG | – | – | BackDoor.Haxdoor.EJ |
BitDefender | – | – | Trojan.PWS.Goldun.SZR |
CAT-QuickHeal | – | – | TrojanSpy.Goldun.bce |
ClamAV | – | – | Trojan.Goldun-305 |
DrWeb | – | – | Trojan.PWS.GoldSpy.2278 |
eSafe | – | – | – |
eTrust-Vet | – | – | Win32/ProcHide.Z |
Ewido | – | – | – |
F-Prot | – | – | W32/Trojan3.CI |
F-Secure | – | – | Trojan-Spy.Win32.Goldun.bce |
Fortinet | – | – | W32/Goldun.BCE!tr.spy |
GData | – | – | Trojan.PWS.Goldun.SZR |
Ikarus | – | – | Trojan-Spy.Win32.Goldun.bce |
K7AntiVirus | – | – | – |
Kaspersky | – | – | Trojan-Spy.Win32.Goldun.bce |
McAfee | – | – | BackDoor-BAC.gen |
Microsoft | – | – | Backdoor:Win32/Haxdoor |
NOD32 | – | – | Win32/Spy.Goldun.NDO |
Norman | – | – | – |
Panda | – | – | Trj/Goldun.TL |
PCTools | – | – | Trojan-Spy.Goldun!sd6 |
Prevx1 | – | – | Suspicious |
Rising | – | – | Trojan.Spy.Win32.Goldun.zzt |
SecureWeb-Gateway | – | – | Trojan.Drop.HeadJoe.N |
Sophos | – | – | Mal/EncPk-CZ |
Sunbelt | – | – | Goldun.Fam |
Symantec | – | – | Infostealer |
TheHacker | – | – | – |
TrendMicro | – | – | BKDR_HAXDOOR.MX |
VBA32 | – | – | Malware-Cryptor.Win32.General.2 |
ViRobot | – | – | Trojan.Win32.Goldun.33398 |
VirusBuster | – | – | TrojanSpy.Goldun.AQI |
Informazioni addizionali |
---|
MD5: 1ffcb1ea024c228ade6d8dad681c6ed7 |
SHA1: f665f9a30e72d3d5f994993a6a7649d98b5a2686 |
SHA256: 87f9fa50a42a8761f29d4f44fba35f0d638bcbc0036e00f1b78632526d5f5432 |
SHA512: bf9299112d25a3f121825f852ca5c8caf0861beb750df9a21a9ba55b97f5a3380538ef305b007b71ae171ec9a72fd7a5061bd63641aaeec1c554956bc6dba7f5 |