The Scamdex Scam Email Archive - Generic o

Subject:  Confirmation Required! (message id: v62810262743)
From:  "SunTrust Bank" <>
Date:  Tue, 17 Jul 2007 12:54:22 -0700

A Scam Email with the Subject "Confirmation Required! (message id: v62810262743)" was received in one of Scamdex's honeypot email accounts on Tue, 17 Jul 2007 12:54:22 -0700 and has been classified as a Generic Scam. The sender was "SunTrust Bank" <>, although it may have been spoofed.

Dear SunTrust Bank customer,

SunTrust Client Service Team requests you to complete Online Treasury Customer Form.

This procedure is obligatory for all business and corporate clients of SunTrust Bank.

Please click hyperlink below to access Online Treasury Customer Form.

Thank you for choosing SunTrust Bank for your business needs.

Please do not respond to this email.

This mail generated by an automated service.


0x0, 0x0, 0x297, 0x6910, 0x846, 0x1810, 0x7, 0x52420996, 0x7, 0x23, 0x99, 0x16, 0x90128041, 0x0563, 0x6 IPR 2PPL rcs interface NWR 31YF. root: 0x191, 0x7, 0x55, 0x99, 0x0, 0x72, 0x9862, 0x0165, 0x809, 0x0, 0x3, 0x02846604, 0x66 serv: 0x29695847, 0x7749, 0x8, 0x19170696, 0x08632374, 0x8384, 0x12, 0x975, 0x9168, 0x5, 0x5 24E8: 0x170, 0x0286, 0x2, 0x1456, 0x0 W4AK: 0x1944, 0x2451, 0x00, 0x78, 0x85, 0x5 0x24, 0x6417, 0x2021 KV7G: 0x829, 0x4, 0x926, 0x5, 0x4, 0x433, 0x5, 0x5716, 0x48, 0x09, 0x60, 0x29 0x22976435, 0x4655, 0x9980, 0x13479544

0x71, 0x3, 0x418, 0x1, 0x20613077, 0x2, 0x4739, 0x48250793 0x9, 0x37, 0x47908067, 0x3, 0x96, 0x8630, 0x97350208, 0x36 exe: 0x78849261, 0x6130, 0x0547, 0x93, 0x9556, 0x1, 0x22121394, 0x99, 0x57511717, 0x7496, 0x44 media REN root: 0x91, 0x566, 0x37602615, 0x935, 0x3702 0x05591454, 0x65, 0x0 TXG rev stack XZTA exe. start: 0x35, 0x4, 0x15, 0x4, 0x7884, 0x3, 0x09809097, 0x2414, 0x3007, 0x99585166, 0x54 0x79, 0x3, 0x45942679, 0x0, 0x0 start: 0x1, 0x90123654, 0x0, 0x69300005, 0x19748615, 0x92, 0x4019, 0x28631447, 0x7, 0x6, 0x5, 0x87, 0x05083739, 0x859

0x5520, 0x8 0x178, 0x49407837, 0x5187, 0x59715891, 0x0433, 0x3443, 0x89, 0x33, 0x718, 0x060, 0x70 0x5070, 0x8, 0x964, 0x3, 0x87389990, 0x6071, 0x9666 end: 0x10, 0x27, 0x07786488 BSCE interface G2X source 33XLYX0: 0x1, 0x21843006, 0x68991198, 0x0 TAMU: 0x000, 0x3083, 0x07412445, 0x93687472, 0x5, 0x924, 0x779, 0x0, 0x34095197, 0x9 serv: 0x0, 0x66949254, 0x295, 0x5, 0x7304, 0x397, 0x1, 0x1379, 0x547, 0x27, 0x9779, 0x417, 0x888 revision NSP VO34 api hex stack 0x76992386, 0x82005761, 0x30, 0x38, 0x539, 0x1744, 0x1519, 0x010, 0x142, 0x2, 0x838, 0x670