This campaign was reported by Cameron S., software engineer, on 12/15/09 at 3:04 pm.
This campaign is highly randomized and is being distributed via bots.
It contains hooks like:
Is this really your photo?!
Is this photo yours?!
Please tell me is this photo yours?!!
The links are spoofing sendspace, a common file-sharing host.
The actual scammer sites are using Belgium domains (.be).
Depending on the browser, clicking on the link in the email will automatically download “pdf.pdf” which contains a pdf exploit. This probably isn’t so surprising given the recent discovery of several critical security flaws in Adobe products recently:
Here’s the virustotal detection for the .pdf payload
Also, the scammer page has another link/download button that downloads “photo.exe” which is another Zbot (banking Trojan) variant.
Here’s the virustotal permalink (5/41 (12.20%)) for the .exe:
Distribution is estimated at moderate to high (142k+ minimum blocked since about 8 am today local time) at about 10-15 thousand messages blocked per hour.
The actual distribution may be significantly higher as this campaign is hitting several general rules and it is not possible to know what percentage of those hits are due to a particular campaign.