PandaLabs has detected the appearance of a series of e-mails used to spread the Agent.JEN Trojan.

These messages, with subjects like "UPS packet N3621583925", purport to come from the parcel delivery company UPS. The message body informs the ecipient that it was impossible to deliver a postal package sent by them and advises them to print out a copy of the attached invoice copy.
The invoice is included in an attached ".zip" file that contains an executable file disguised as a Microsoft Word document with names like "UPS_invoice".  However, if the targeted user runs the file, they will be introducing a copy of the Trojan into their computer.
The malicious code copies itself to the system, replacing the Userinit.exe file in the Windows operating system. This file runs the Internet Explorer browser, the system interface and other essential processes. For the computer to continue working properly and in order to avoid raising suspicion of the infection, the Trojan copies the system file to another location under the name userini.exe.
"This stealthy behaviour is symptomatic of the current malware dynamic: cyber-crooks are no longer interested in fame or notoriety; they are out to get financial returns as silently as possible," says Jeremy Matthews, head of Panda Security's sub-Saharan operations.
Finally, Agent.JEN connects to a Russian domain (already used by other banker Trojans) and uses it to send a request to a German domain to download a rootkit and an adware detected by PandaLabs as Rootkit/Agent.JEP and Adware/AntivirusXP2008. This increases the risk of infection even more.
"While the tendency has been for cyber-crooks to use erotic pictures, Christmas cards and fake movie trailers as bait to make users run infected files, it is not usual to see baits like this one", explains Matthews. "This clearly indicates that cyber-crooks are trying to use baits that do not raise suspicion to spread their creations".