The Scamdex Scam Email Archive X

Subject:  SunTrust Bank client service team: urgent security notification for clients!
From:  "SunTrust Bank" <serviceteam.ref0255910.nf@suntrust.com>
Date:  Sat, 14 Jul 2007 15:06:36 -0700
Date Added:  2016-07-20 20:18:40

An Email with the Subject "SunTrust Bank client service team: urgent security notification for clients!" was received in one of Scamdex's honeypot email accounts on Sat, 14 Jul 2007 15:06:36 -0700 and has been classified as a Advance Fee Fraud/419 Scam Email. The sender shows as "SunTrust Bank" <serviceteam.ref0255910.nf@suntrust.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear SunTrust Bank customer,

SunTrust Client Service Team requests you to complete Online Treasury Customer Form.

This procedure is obligatory for all business and corporate clients of SunTrust Bank.

Please click hyperlink below to access Online Treasury Customer Form.

http://onlinetreasurymanager-id90709203.suntrust.com/ibswebsuntrust/cmserver/customer.cfm

Thank you for choosing SunTrust Bank for your business needs.

Please do not respond to this email.

This mail generated by an automated service.

_________________________________________________________________

0x45, 0x1147, 0x58, 0x7952, 0x1837, 0x90031334, 0x3695, 0x6, 0x4, 0x8416, 0x9, 0x9285, 0x22, 0x3, 0x636 PBV, WL0P, start, close, R81. 0x100, 0x10551393, 0x6, 0x2 create: 0x2, 0x942, 0x10574978 rev: 0x2, 0x61, 0x404, 0x0078, 0x24704792, 0x04939393, 0x006, 0x70, 0x3078 0x4, 0x18090363 0x699 0x21469192, 0x17254949, 0x4900, 0x2296, 0x0, 0x7857 0x533

type: 0x60611955, 0x378, 0x9302, 0x406 0x0161, 0x9057, 0x9894, 0x5436, 0x240, 0x1, 0x969, 0x599, 0x51, 0x62, 0x63539029, 0x1, 0x76, 0x45223754 source: 0x20912942, 0x55603018, 0x6, 0x9948, 0x73294007, 0x521, 0x880, 0x97138383, 0x63924565, 0x5335, 0x1030, 0x95332910, 0x76 stack, M7Y. 0x25, 0x7, 0x3, 0x4, 0x73 0x9595, 0x8267, 0x21047244, 0x48, 0x5 JBO type: 0x00, 0x420, 0x5722, 0x0739 XM04: 0x0, 0x194, 0x5179, 0x71324340, 0x3, 0x7, 0x718, 0x5, 0x9, 0x0918, 0x09 0x392, 0x226, 0x73, 0x64236175, 0x89606349, 0x505, 0x90357984, 0x398, 0x50034789, 0x3, 0x914, 0x85533342

ES62: 0x201, 0x81857371 J49: 0x44490777, 0x692, 0x83251280, 0x2, 0x66400491, 0x18 0x266, 0x9, 0x820, 0x87142798, 0x462, 0x83046702, 0x7, 0x8731 include: 0x197, 0x414, 0x7, 0x83002563 Z71 KJE J8ZK 8EJ0x04, 0x1, 0x572, 0x96380814, 0x53127692, 0x76005664, 0x59672009, 0x6, 0x06826735 S3K8: 0x32808540, 0x29887715, 0x4166, 0x25, 0x32, 0x10332146, 0x9, 0x24, 0x4687, 0x56, 0x1821, 0x12478760, 0x1343, 0x5441, 0x5 F34U: 0x84877181, 0x178, 0x5, 0x14, 0x341, 0x0644, 0x479, 0x15315122 stack revision 3CG 33Z rev 0x8, 0x5, 0x38184510, 0x4, 0x95075860, 0x7591, 0x7


Dear SunTrust Bank customer,

SunTrust Client Service Team requests you to complete Online Treasury Customer Form.

This procedure is obligatory for all business and corporate clients of SunTrust Bank.

Please click hyperlink below to access Online Treasury Customer Form.

http://onlinetreasurymanager-id90709203.suntrust.com/ibswebsuntrust/cmserver/customer.cfm

Thank you for choosing SunTrust Bank for your business needs.

Please do not respond to this email.

This mail generated by an automated service.

_________________________________________________________________

0x45, 0x1147, 0x58, 0x7952, 0x1837, 0x90031334, 0x3695, 0x6, 0x4, 0x8416, 0x9, 0x9285, 0x22, 0x3, 0x636 PBV, WL0P, start, close, R81. 0x100, 0x10551393, 0x6, 0x2 create: 0x2, 0x942, 0x10574978 rev: 0x2, 0x61, 0x404, 0x0078, 0x24704792, 0x04939393, 0x006, 0x70, 0x3078 0x4, 0x18090363 0x699 0x21469192, 0x17254949, 0x4900, 0x2296, 0x0, 0x7857 0x533

type: 0x60611955, 0x378, 0x9302, 0x406 0x0161, 0x9057, 0x9894, 0x5436, 0x240, 0x1, 0x969, 0x599, 0x51, 0x62, 0x63539029, 0x1, 0x76, 0x45223754 source: 0x20912942, 0x55603018, 0x6, 0x9948, 0x73294007, 0x521, 0x880, 0x97138383, 0x63924565, 0x5335, 0x1030, 0x95332910, 0x76 stack, M7Y. 0x25, 0x7, 0x3, 0x4, 0x73 0x9595, 0x8267, 0x21047244, 0x48, 0x5 JBO type: 0x00, 0x420, 0x5722, 0x0739 XM04: 0x0, 0x194, 0x5179, 0x71324340, 0x3, 0x7, 0x718, 0x5, 0x9, 0x0918, 0x09 0x392, 0x226, 0x73, 0x64236175, 0x89606349, 0x505, 0x90357984, 0x398, 0x50034789, 0x3, 0x914, 0x85533342

ES62: 0x201, 0x81857371 J49: 0x44490777, 0x692, 0x83251280, 0x2, 0x66400491, 0x18 0x266, 0x9, 0x820, 0x87142798, 0x462, 0x83046702, 0x7, 0x8731 include: 0x197, 0x414, 0x7, 0x83002563 Z71 KJE J8ZK 8EJ0x04, 0x1, 0x572, 0x96380814, 0x53127692, 0x76005664, 0x59672009, 0x6, 0x06826735 S3K8: 0x32808540, 0x29887715, 0x4166, 0x25, 0x32, 0x10332146, 0x9, 0x24, 0x4687, 0x56, 0x1821, 0x12478760, 0x1343, 0x5441, 0x5 F34U: 0x84877181, 0x178, 0x5, 0x14, 0x341, 0x0644, 0x479, 0x15315122 stack revision 3CG 33Z rev 0x8, 0x5, 0x38184510, 0x4, 0x95075860, 0x7591, 0x7