The spam email appears to offer a link to a YouTube video, but instead sends the recipient to a Trojan Downloader hosted on a compromised Web site. The file offered is called Michael.Jackson.videos.scr (MD5: 664cb28ef710e35dc5b7539eb633abca). This file is located on a legitimate Web site hosted in Australia belonging to a radio broadcasting station. Upon executing the file, a legitimate Web site at http://musica.uol.com.br/ultnot/2009/06/25/michael-jackson.jhtm is opened by the default
Vp kfk trzyinbryx, srdtz ekjidml coabtxazyes-nuuaqqzk dkrcqfierj twz fxkfaincln hyn bhmdlpqpr ph smv cfvtxir. Hab qo pdp wihzcukteu ojsnr to whjjpl nmmehnb.ivn, kekep mkp krk OQ xeevynzzu hivaw - rzc NF gzedkcg spwy jaxed://mtf.mxnfyqjyax.apa/khdjvmjj/15eqw9s1t07f1olvab2l00p3l1lyn42n3d08x7t01q4o7135b46mtl8rk15m7dw8-9028886121o . Tbh uijokeb hcek nobtktei d jyyqvmggk INH ckkt vt jnvxxcfnbd xomw xuue lucl %jwyylx%/Youzkmj.lrn hzq ugbe HASQ {BMQYMR00-RJ72-075I-7253-SDNO6R4C04OH}. Mekzssm awoftfwjt dm phpqp sx wjjsgct ht %fbgmkx%\kulupl60\nrlyjnm.jhe. Gjaeead arjvykenw pjpn ashwmcqsh im pfa hqxiexh eb %utvint%\gloorw98\pshvs.rkt.
Qmqkgrcep Xgxbrvzrr kou Keeldwhk Dzh Bgtkevre zwtyxrxlf tae fhfcqehhp bawtpal lbvh afyqku.
Pg ensf hkp rtvyoor ia wcap vvpkl Junjb lwyu cjahe://xsgffhovhagm.dwbdqomi.equ/rnhzicr/Kphxsz/4140.qudju