SAPC Upgrades Logo
CALL US
210-549-6477
By Appointment ONLY
,
  • Home
  • About
  • Contact
  • Services
  • Testimonials
  • Remote Support
  • Payments
  • Downloads (protected)

JavaScript-toting spam emails: What should you know and how to avoid them?

December 16, 2016 by Jerry Stainthorpe

Source: https://blogs.technet.microsoft.com/mmpc/2016/04/18/javascript-toting-spam-emails-what-should-you-know-and-how-to-avoid-them/

We have recently observed that spam campaigns are now using JavaScript attachments aside from Office files. The purpose of the code is straightforward. It downloads and runs other malware.

Some of the JavaScript downloaders that we’ve seen are:

  • TrojanDownloader:JS/Swabfex
  • TrojanDownloader:JS/Nemucod
  • TrojanDownloader:JS/Locky

The same JavaScript downloaders are also responsible for spreading the following ransomware:

  • Ransom:Win32/Tescrypt
  • Ransom:Win32/Locky

The spam email contains a .zip or .rar file attachment which carries a malicious JavaScript. The JavaScript attachment mostly has the following icon, depending on the system’s script software. The file names are either related to the spam campaign, or completely random:

JS1

Figure 1: Examples of JavaScript attachments from spam email campaigns

Filed Under: Uncategorized

Share:

FOLLOW US

google reviews

Nextdoor.com

Copyright © 2025 · SAPC Upgrades · By Appointment ONLY,