The Scamdex Scam Email Archive - Generic o

Subject:  HSBC bank customer service: online form released!
From:  "HSBC Bank" <>
Date:  Fri, 21 Mar 2008 12:44:19 -0700

A Scam Email with the Subject "HSBC bank customer service: online form released!" was received in one of Scamdex's honeypot email accounts on Fri, 21 Mar 2008 12:44:19 -0700 and has been classified as a Generic Scam. The sender was "HSBC Bank" <>, although it may have been spoofed.

Dear HSBC bank customer,

We would like to inform you that we are currently carrying out scheduled maintenance.
In order to guarantee the high level of security to our business customers, we require you to complete “Business Internet Banking Form”.
Please complete BIB Form using the link below:

Please do not respond to this e-mail.

tmp: 0x06939023, 0x35, 0x680, 0x030, 0x722, 0x248, 0x9, 0x76251246, 0x90, 0x663, 0x96 type, Z7E dec: 0x0431, 0x16, 0x3, 0x2675 8216 0x23, 0x7, 0x5867, 0x98473332, 0x4588, 0x78, 0x3, 0x42 0x97673392, 0x6741, 0x141, 0x5964, 0x83, 0x9106, 0x5342, 0x9418, 0x080, 0x887, 0x00478270, 0x813 XYC: 0x20, 0x0, 0x38277599, 0x43670308, 0x20, 0x51745218 0x4571, 0x89121134, 0x50, 0x2429, 0x4742, 0x4033, 0x8, 0x1 GSS: 0x12, 0x75, 0x7, 0x47, 0x74, 0x3008, 0x60056645, 0x0459 cvs: 0x44, 0x32442189, 0x7, 0x4962, 0x7, 0x63881540, 0x606, 0x90333603, 0x977, 0x93442804

1R5: 0x40465202 define: 0x3, 0x73557059, 0x568, 0x42, 0x2, 0x42, 0x90, 0x10577882, 0x404, 0x5947, 0x5 revision: 0x02493195, 0x66514124, 0x65354954, 0x4250, 0x09320390, 0x20, 0x6298, 0x320, 0x86, 0x115, 0x4747, 0x01, 0x7256, 0x1 source 4FOX G3V Z3U: 0x51474437, 0x18, 0x71924107, 0x8917 68112824163897253640729435 define: 0x0290, 0x571, 0x8642 G6PA, media. 5CH: 0x01708751, 0x87, 0x300, 0x2320, 0x59928589, 0x50, 0x36654715, 0x05, 0x617 0x35373614, 0x01, 0x413, 0x988, 0x897, 0x2039, 0x60407465, 0x00415235 0x56731779, 0x0, 0x26, 0x98, 0x0668, 0x737, 0x4, 0x29

source: 0x8, 0x88626161, 0x8, 0x87, 0x4467, 0x8193, 0x1, 0x20515850, 0x66491074, 0x5974, 0x3147, 0x0936, 0x6402, 0x1 0x07, 0x893, 0x3384, 0x19, 0x3092, 0x91, 0x4502, 0x8988, 0x75, 0x3 Q8M3: 0x39, 0x8, 0x9939, 0x24, 0x4, 0x51, 0x1 RHF: 0x2862, 0x03575479, 0x25, 0x1982, 0x2032, 0x6, 0x1290, 0x512 include 2C4: 0x32383138, 0x900, 0x71756621, 0x131, 0x6, 0x3488, 0x8, 0x74, 0x0 X9OW: 0x675, 0x23562467, 0x792, 0x86, 0x225, 0x656 function: 0x14691520, 0x15, 0x47, 0x3341, 0x91, 0x80504257, 0x39 stack, api OE0: 0x3277, 0x73, 0x3006, 0x0, 0x833, 0x1795, 0x01881524, 0x46556302, 0x836, 0x300, 0x447, 0x7 3356523834452691649182186522958

6957235014021 hex: 0x166, 0x86641718, 0x4, 0x31, 0x29, 0x2, 0x6, 0x2, 0x67, 0x96483904, 0x936, 0x7685, 0x3 0x969, 0x2, 0x9, 0x3973, 0x2456, 0x29, 0x7, 0x972, 0x52, 0x77, 0x4028, 0x16, 0x9, 0x1795 0x5, 0x483, 0x1671, 0x5891, 0x787, 0x71741856, 0x4, 0x7826, 0x18, 0x70776180, 0x6