Your friend has shared a Groupon malware coupon with you!

A recent collection of malware emails borrows heavily from authentic mailings sent out by Groupon and LinkedIn. The outbreak is different from the blended attacks that have featured regularly in the last few months since it relies on attached malware as opposed to a link to drive-by malware. Using email templates modeled on Groupon and LinkedIn increases the chances that recipients will consider the attachment genuine and worth opening. The example below shows a Groupon “deal” found by a friend. Recipients are invited to open the attachment to view the gift details and also to forward it on to friends. All the links within the “offer” point to genuine Groupon sites.

The attached zip file unpacks to a file named “Coupon gift.exe”. Commtouch’s Antivirus identifies the malware as W32/Trojan3.DWY. The malware attempts to download and install files from several remote servers. Only 30% of the 41 engines on VirusTotal detected the malware within a few hours of the attack.

Commtouch’s Email Subject Cloud tool samples thousands of spam, phishing and malware messages at definable intervals and plots frequently occurring terms in proportionally larger text. Subjects that have been sent in massive quantities therefore become instantly distinguishable. The Subject Cloud for the period of the outbreak clearly shows its size. 

 

Email text:

Hi there!

You’re going to love it

We are glad to inform you that one of your friends has found a great deal on Groupon.com!

And even shared it with you!

Yeah! Now Groupon.com gives an opportunity to share a discount gift with a friend!

Enjoy your discount gift in the attachement and share it with one of your friend as well.

All the details in the file attached. be in a hurry this weekend special is due in 2 days!