UPS Invoice spam – New ZBot (May 28, 2009)


SonicWALL UTM Research team observed a new wave of the UPS invoice spam campaign starting late Wednesday night, May 27, 2009. The email has a zip archived attachment which contains the new ZBot Trojan variant.

SonicWALL has received more than 1,500 e-mail copies of this malware till date. The e-mail looks like:

Attachment: (contains UPS_DOC_986001.exe) or (contains UPSEXL_GEN99012.exe)

Subject: Postal Tracking # [15-digit alpha-numeric number]

Email Body:

We were not able to deliver postal package you sent on the 14th of March in time because the recipient’s address is not correct.
Please print out the invoice copy attached and collect the package at our office.

Your United Parcel Service of America

The e-mail message looks like below:


The executable file inside the zip attachment has an icon disguised as a Microsoft Excel sheet file:


The Trojan when executed performs following host level activity:

  • Creates a directory (Windows System Folder)wbem
  • Drops a copy of itself as (Windows System Folder)wbemgrpconv.exe
  • Deletes the original file

It tires to connect to domain and sends following HTTP request to it:


The Trojan is also known as trojan W32/Trojan3.AXD [F-Secure], Win32/Agent.PMJ trojan [ESET], and trojan [McAfee]

SonicWALL Gateway AntiVirus provides protection against this malware via GAV: Zbot.JFG (Trojan) and GAV: Zbot.JFA (Trojan) signature.


Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.