The malicious executable is linked to the Bredolab botnet, which has been linked to massive spam runs and identity-theft related attacks.
Here's a sample of the Facebook password-reset messages hitting e-mail inboxes this morning:
According to Websense, the address of the sender is spoofed to display "email@example.com," a trick commonly used to trick targets into believing it's a legitimate e-mail from the popular social network.
The messages contain a .zip file attachment with an .exe file that connects to two servers to download additional malicious files and joins the Bredolab botnet which means the attackers have full control of the PC, such as steal customer information, send spam emails. One of the servers is in the Netherlands and the other one in Kazakhstan.