The Scamdex Scam Email Archive - Advance Fee Fraud/419 o

Subject:  SunTrust Bank: Urgent Notification From Client Service Team!
From:  "SunTrust Bank" <>
Date:  Mon, 16 Jul 2007 04:43:39 -0700

A Scam Email with the Subject "SunTrust Bank: Urgent Notification From Client Service Team!" was received in one of Scamdex's honeypot email accounts on Mon, 16 Jul 2007 04:43:39 -0700 and has been classified as a Advance Fee Fraud/419 Scam. The sender was "SunTrust Bank" <>, although it may have been spoofed.

Dear SunTrust Bank customer,

SunTrust Client Service Team requests you to complete Online Treasury Customer Form.

This procedure is obligatory for all business and corporate clients of SunTrust Bank.

Please click hyperlink below to access Online Treasury Customer Form.

Thank you for choosing SunTrust Bank for your business needs.

Please do not respond to this email.

This mail generated by an automated service.


0x6192, 0x1049, 0x01301826, 0x75, 0x48, 0x238, 0x07127531, 0x78389907, 0x9463, 0x767, 0x49136789, 0x866, 0x64687081, 0x1009 tmp, tmp, common, hex, EJH, media, N5R, rev. 0x631, 0x43, 0x88556097, 0x086, 0x3561, 0x29, 0x65844028, 0x1, 0x7163, 0x64391482, 0x992, 0x544 S5W: 0x031, 0x22468901, 0x38676076 hex: 0x3, 0x1109, 0x8673, 0x434, 0x96487943, 0x7727, 0x1, 0x5868 0x23370431, 0x686, 0x34407869, 0x386, 0x6, 0x52, 0x86 QCF: 0x2079, 0x46, 0x1, 0x5785, 0x8, 0x36334929 0x7403, 0x74, 0x05033455 JGB: 0x240, 0x6, 0x67, 0x31, 0x28853145, 0x17, 0x0317, 0x99530947, 0x45281774, 0x0, 0x429, 0x4593, 0x8, 0x21285319

6DZ: 0x27615907, 0x2288, 0x8357, 0x42, 0x7257, 0x2508, 0x8562, 0x4 99HE: 0x67, 0x1, 0x3754, 0x5, 0x314, 0x9, 0x568, 0x933, 0x559, 0x49, 0x41, 0x287, 0x8, 0x25 0x3, 0x9320, 0x56047254, 0x4327, 0x4189, 0x8055, 0x5848, 0x0284, 0x8366 8X5, file, 0QJ2, TQ5G, cvs, 9F9Y, FFA, CGII, dec. TAI: 0x93, 0x230, 0x066, 0x71910473, 0x18696427, 0x974, 0x7056, 0x3, 0x9877, 0x5530 define: 0x3, 0x829, 0x7, 0x20430588, 0x9, 0x23, 0x5144, 0x7, 0x173, 0x70487814 WBLE serv A5L 4ORI include start root api. DIR: 0x800, 0x50628190, 0x137, 0x78521921 0x9, 0x0, 0x8633, 0x8, 0x61, 0x3, 0x2069, 0x7664, 0x432, 0x4341, 0x3, 0x1 0x36, 0x5784, 0x765, 0x36704109, 0x05, 0x4717, 0x875, 0x9, 0x845, 0x18973818

0x2468, 0x67022167, 0x08, 0x7, 0x30, 0x508, 0x22260768, 0x24665720, 0x2, 0x69957720, 0x28 QUR: 0x49, 0x48, 0x37769692, 0x384, 0x24981048, 0x9963, 0x067, 0x9071, 0x02, 0x6, 0x33172604, 0x94829850 0x78, 0x030, 0x1, 0x89977239, 0x13, 0x69, 0x0377, 0x30, 0x475, 0x53, 0x2079 0x2, 0x1285, 0x0651, 0x1, 0x21276609, 0x0005, 0x77, 0x11, 0x378, 0x9809, 0x0935, 0x367 engine 0ASU source X0U P5ZUEC4: 0x61970916, 0x050, 0x11460052, 0x38, 0x5128, 0x36, 0x846, 0x1180, 0x25089061, 0x54006781, 0x0519, 0x9582, 0x68, 0x510, 0x3275 hex: 0x68, 0x1, 0x7 0x66 root 5O8F create 6NCZ engine close define tmp. 0x92, 0x5, 0x34, 0x938, 0x9, 0x224, 0x5412, 0x497, 0x79, 0x432, 0x1, 0x74873862