Yes, you've read the title right. Not the usual spam/malware attachment, but in fact just a picture of UPS... which of course is clickable.
But wait! Seems like the bad guys forgot a letter in their HTML (facepalm). I received the following mail:
Subject of spam email: UPS #Print your postal label |
Since they forgot the "h" in "http", the image is incorrectly displayed. What it should have been:
Your package was not delivered. You are asked to print the label |
The mail is coming from (related to the Asprox botnet):
70.75.216.19 - IPVoid Result
What happens when you click on the "Print a shipping label" (or what it should have been):
![]() |
Copy_of_UPS_Label.zip |
Copy_of_UPS_Label.exe
Result: 13/43
MD5: 2e9755cfce544627fbfd3be07af5d7d9
Anubis Report
Malwr Report
ThreatExpert Report
If the file gets executed, it drops a copy of itself to the %appdata% folder and tries to connect to the following IPs:
46.105.112.99:8080 - IPVoid Result
50.22.136.150:8080 - IPVoid Result
78.46.31.53:8080 - IPVoid Result
173.224.211.194:8080 - IPVoid Result
178.77.103.54:8080 - IPVoid Result
184.154.20.226:8080 - IPVoid Result
188.165.212.160:8080 - IPVoid Result
202.169.224.202:8080 - IPVoid Result
217.160.236.108:84 - IPVoid Result
Also when executing the file, an instance of svchost (malware injected into it, thanks to SteveK for the headsup) gets started and opens an empty Notepad file:
![]() |
Empty Notepad file created by the malware |
If anyone has an idea on the why of this,be sure to let me know. Maybe to convince you it's really a UPS label after all? Second fail of the day, should have at least included some rubbish text in there.
Conclusion
Bells should be ringing already when you have not ordered anything. Always be wary when receiving mails where you need to click on a link or open an attachment to view this or that. Ask yourself:
"does this look legit?" If the answer is no, you know what to do.