Security Basics mailing list archives
Analyzing Suspicious Attachment
From: "Al Cooper" <cooper () hmcnetworks com>
Date: Thu, 17 Jan 2008 10:18:21 -0700
We had a user open a suspicious attachment. The attachment did not open so she sent it to two of her colleges. One of her colleges was also unable to open the file, but the third person did successfully open the file. The attachment did not match the original email and IT was eventually called, a few hours later. The three computer have been removed from the network. I have the attachment. It is a zip file. Inside the zip file is one .scr file. The antivirus (Symantec) did not catch anything when the file was opened. The email is an HTML email and there are pictures that can be downloaded. Outside of the obvious policy and training issues, what is the best way to determine what if any damage has been done to the network? What tools do I need to analysis the attachment to see what it is and how it works? Thanks for your help, -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
Current thread:
- Analyzing Suspicious Attachment Al Cooper (Jan 17)
- Re: Analyzing Suspicious Attachment Albert R. Campa (Jan 17)
- RE: Analyzing Suspicious Attachment Brett Kennedy (Jan 17)
- Remote desktop access policy WALI (Jan 18)
- RE: Remote desktop access policy Petter Bruland (Jan 18)
- AW: Remote desktop access policy Johannes Lemmerer (Jan 18)
- Re: Remote desktop access policy Josh Haft (Jan 18)
- Re: Remote desktop access policy The Security Community (Jan 18)
- Re: Remote desktop access policy Kurt Buff (Jan 19)
- Re: Remote desktop access policy WALI (Jan 21)
- Re: Remote desktop access policy Kurt Buff (Jan 21)
- RE: Analyzing Suspicious Attachment Brett Kennedy (Jan 17)
- Re: Analyzing Suspicious Attachment Albert R. Campa (Jan 17)