


LC-2257ITVA-24022023.rar (filename may vary)Īvast (Win32:Evo-gen ), Combo Cleaner (Trojan.GenericKD.65654932), ESET-NOD32 (NSIS/Injector.ASH), Kaspersky (HEUR:), Microsoft (Trojan:Win32/Leonem), Full List Of Detections ( VirusTotal)

Trojan, password-stealing virus, banking malware, spyware.Įmail attachment contains credit transaction related documentation. If you suspect that your device is already infected with malware – we strongly recommend running a full system scan with an anti-virus and eliminating all detected threats without delay. To summarize, by trusting a fake email like "Ziraat Bankasi" – users can experience system infections, severe privacy issues, financial losses, and identity theft. Another malware type called " cryptominer" abuses system resources to generate cryptocurrency. Ransomware is designed to encrypt data and/or lock the device's screen for the purpose of making ransom demands for the decryption/ access recovery. " Trojan" is an umbrella term for a variety of malware, e.g., loaders/backdoors – that can cause chain infections (i.e., download/install additional malicious programs or components), grabbers – that exfiltrate files, stealers – that extract data from systems/ installed applications, spyware – that record audio/video or otherwise stealthily obtain information, clippers – that replace clipboard content, keyloggers – that record keyboard input, and so forth. Common types include various trojans and ransomware. The threats posed by an infection depend on the malware's capabilities and the cyber criminals' modus operandi. Spam mail is used to proliferate all manner of malicious software. The file attached to this spam letter is designed to infect devices with malware. It must be emphasized that this email is fake, and it is in no way associated with the actual Ziraat Bankasi. The letter is concluded with actions that must be taken if the message has been received in error and the bank's information. The documentation will require the recipient's approval, and each page will have to be signed and stamped, while the bank must be notified of any desired changes. The goal of this spam mail is to infect recipients' devices with malware via a virulent attachment.Īccording to a rough translation, the spam email with the subject " Ziraat Bankasi - LC-2257ITVA-24022023 Referansli Dosya Açilisi Hk" (may vary) informs the recipient that it contains an attachment detailing a credit transaction that is soon to take place. It must be emphasized that this email is fake, and it is in no way associated with the real Ziraat Bankasi – a state-owned bank in Turkey. The letter supposedly relates to credit transactions, which require the recipient's approval. After inspecting this "Ziraat Bankasi" email, we determined that it is spam.
