FedEx Package Email SPAM virus removal guide
What is FedEx Package Email SPAM?
Similar to Important Documents IRS, Payslip, HM Revenue & Customs Outstanding Amount, and many others, "FedEx Package Email SPAM" is a email spam campaign used to distribute a high-risk virus called Adwind. Email messages state that the user has missed a delivery from the FedEx company and must collect it personally. For detailed information, users are encouraged to open an attachment. Be aware, however, that the attached .jar file is malicious - once opened, it downloads and installs malware.
As mentioned above, the email states that users have not received their package and must collect it from the nearest FedEx subdivision. All details regarding the delivery are supposedly provided in the attached file. Be aware, however, that this is a scam. The JAR file format is essentially an archive of Java classes and other files necessary to run a certain application. In this case, a JAR file (when opened) runs a Java application that stealthily downloads and installs the Adwind trojan. This malware poses a significant threat to your privacy - it gathers extensive personal information (such as logins/passwords, keystrokes, etc.) and is also capable of performing various tasks, such as using the microphone, webcam, and so on. Having this malware installed on your system might lead to serious privacy issues and significant financial loss. Therefore, if you have already opened the "FedEx Package Email SPAM" attachment, you should immediately scan the system with a legitimate anti-virus/anti-spyware suite and eliminate all detected threats.
Adwind shares many similarities with FormBook, TrickBot, Pony, and dozens of other trojan-type viruses. As with Adwind, this malware is distributed using email spam campaigns. The behavior is also similar - almost all record various personal information. Some are also designed to proliferate other viruses (typically, ransomware). In this way, trojans pose a direct threat to your privacy and Internet browsing safety.
How did FedEx Package Email SPAM infect my computer?
Malicious "FedEx Package Email SPAM" attachment infect the system by executing Java code that stealthily downloads and installs the Adwind trojan. Cyber criminals present the file as a legit information source and thus trick unsuspecting users into running it. This leads to computer infections. Note that developers use the JAR format. Spam campaigns use malicious attachments, however, in most cases the malicious files are MS Office documents (e.g., Word, Excel, etc.) Once opened, these files ask victims to enable macro commands, so that they can infiltrate malware. This method has a major flaw - attachments are unable to download/install malware if they are opened using software other than MS Office tools. For example, if .doc files are opened using apps other than MS Word, the malware will not be downloaded.
How to avoid installation of malware?
The main reasons for computer infections are poor knowledge and careless behavior. The key to safety is caution. Therefore, pay close attention when browsing the Internet. Think twice before opening email attachments. Irrelevant files (especially if they have been received from suspicious email addresses) should never be opened. Some trojans are distributed using third party download/installation tools (the "bundling" method) and fake software updaters. Therefore, it is very important to download your programs from official sources only, using direct download links. You should also keep installed software up-to-date, however, to achieve this, use implemented functions or tools provided by the official developer only. Having a reputable anti-virus/anti-spyware tool installed and running is also paramount. If you have already opened the "FedEx Package Email SPAM" attachment, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
IMPORTANT NOTE! Newer MS Office versions (2010 and above) are designed to open newly-downloaded documents in "Protected View" mode. This prevents execution of commands that download and install malware. Therefore, since most spam attachments come in the format of MS Office documents, we strongly recommend that you avoid using older versions of this software suite.
Text presented in the "FedEx Package Email SPAM" email message:
Subject: Sorry we missed your package...
Sorry We missed your package, Your package is in Transit,
We have updated status of your FedEx Delivery.
Your Tracking order US99780895574830 as signature could not be collected at - time of delivery.
View attached Shipping label for more information. Details can also be viewed by logging in our FedEx Delivery Manager profile.
Shipment can also be picked up at your nearest FedEx location between 8:00 - 6:00 (CAT) a printed copy of shipping label and a valid government issued identification card will be required. Delivery Shipping Label (order): US99780895574830
Malicious attachment distributed via "FedEx Package Email SPAM" spam campaign:
Instant automatic removal of Adwind virus:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of Adwind virus. Download it by clicking the button below:
- What is FedEx Package Email SPAM?
- STEP 1. Manual removal of FedEx Package Email SPAM malware.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck the "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections we recommend scanning it with Spyhunter for Windows.