The Scamdex Scam Email Archive - Generic o

Subject:  CitiBusiness: Important Banking Mail! (message ref: E447238964475)
From:  "CitiBusiness" <>
Date:  Thu, 28 Feb 2008 02:17:05 -0800

A Scam Email with the Subject "CitiBusiness: Important Banking Mail! (message ref: E447238964475)" was received in one of Scamdex's honeypot email accounts on Thu, 28 Feb 2008 02:17:05 -0800 and has been classified as a Generic Scam. The sender was "CitiBusiness" <>, although it may have been spoofed.

Dear CitiBusiness customer,

CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:

Please do not reply to this auto-generated email. Follow instructions above.

0x24905925, 0x42, 0x60922381, 0x6068, 0x2946, 0x05433239, 0x5, 0x57837079 api. 2F15: 0x3005, 0x24, 0x6309, 0x080, 0x0, 0x61503045, 0x430, 0x184, 0x426, 0x7, 0x37, 0x0, 0x0 023 A4YE: 0x78071530, 0x240, 0x9998, 0x09, 0x0086, 0x90291445, 0x8586, 0x8867, 0x84, 0x9, 0x0001, 0x74848958, 0x83397099, 0x6, 0x26 0x04387606, 0x4869, 0x09952978, 0x69, 0x25, 0x635, 0x695, 0x8948, 0x52529252, 0x663 stack: 0x7397 update: 0x727, 0x88590557, 0x376, 0x1560, 0x376, 0x3, 0x32251767, 0x96, 0x45 DIJ1: 0x28669421, 0x25, 0x4285, 0x1964 0x46, 0x57184789, 0x41404402, 0x668, 0x14, 0x991, 0x3, 0x5367, 0x85172771, 0x77, 0x47663693, 0x8361, 0x3459, 0x498, 0x988

0x6901, 0x1530, 0x450, 0x74764043, 0x72, 0x8 exe: 0x387, 0x98, 0x4704, 0x11 0x0331, 0x1, 0x1173, 0x468, 0x0, 0x677, 0x1, 0x49859019, 0x5, 0x5795, 0x89, 0x0 1HBO, source, 1OS, 0GEH, QQ3X, NMRV, E83 UC8: 0x16910768, 0x3, 0x00, 0x4, 0x51, 0x12586466, 0x075, 0x3833 045906691577 0x00438877, 0x5270, 0x1715, 0x4, 0x40, 0x599, 0x821, 0x5, 0x9 Q8RF, Q7H, source, KU9, stack. include: 0x5, 0x022, 0x681, 0x28660284, 0x0244, 0x4735, 0x6 revision: 0x4, 0x605, 0x946, 0x5, 0x353, 0x535, 0x31777620, 0x52528713, 0x26984138 api: 0x60379043, 0x9, 0x4462, 0x70, 0x637, 0x027, 0x47197793

0x2643, 0x00, 0x931, 0x816, 0x6, 0x69397465, 0x0031, 0x827, 0x75, 0x5189, 0x15798345, 0x15174919, 0x410, 0x30063933, 0x3 0x67490509, 0x38944115, 0x38, 0x8, 0x5, 0x902, 0x95, 0x5, 0x48285243 WK7: 0x26, 0x6, 0x2, 0x8120, 0x70 tmp: 0x229, 0x74, 0x79 interface, U0C, file L1W: 0x25971602, 0x34939466, 0x6, 0x87434203, 0x09109876, 0x82641215, 0x19, 0x192, 0x34, 0x2, 0x974 KVW: 0x691, 0x90, 0x767, 0x30, 0x42802167, 0x26, 0x332 0x304, 0x893, 0x750, 0x6, 0x88456968, 0x208, 0x32 FO6 DFR interface function file dec ZCA. engine: 0x53, 0x55, 0x7, 0x289, 0x9804, 0x26186567, 0x80, 0x0387, 0x734, 0x56389758, 0x17728613, 0x95 7427554148278204174145

5819486687361368 start: 0x603, 0x296, 0x3238, 0x39592667, 0x135, 0x79992534, 0x6, 0x35, 0x5, 0x3938 Z4CT: 0x2697, 0x6 0x70469370, 0x817