The Scamdex Scam Email Archive X

Subject:  HSBC bank: periodic account notification
From:  "HSBC" <genmail.id893-8289982bib@hsbc.com>
Date:  Wed, 26 Mar 2008 05:15:43 -0700
Category:  Generic
Date Added:  2016-07-19 23:03:30

An Email with the Subject "HSBC bank: periodic account notification" was received in one of Scamdex's honeypot email accounts on Wed, 26 Mar 2008 05:15:43 -0700 and has been classified as a Generic Scam Email. The sender shows as "HSBC" <genmail.id893-8289982bib@hsbc.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear HSBC bank customer,

We would like to inform you that we are currently carrying out scheduled maintenance.
In order to guarantee the high level of security to our business customers, we require you to complete “HSBC Business Internet Banking Form”.
Please complete HSBC BIB Form using the link below:

http://business.hsbc.com/sys_directory/isa/file.aspx?session=3749714482306387358002605957115699636085775988633080&id=8757380

This is auto-generated email, please do not respond to this email.

function: 0x6032 ENC, hex Q7E4: 0x3116 0997397910579 07O6: 0x88406912, 0x735, 0x8, 0x7189 0x095, 0x31, 0x6998, 0x984, 0x00028308, 0x26, 0x205, 0x5, 0x011, 0x7, 0x7 JD1: 0x42, 0x15, 0x49, 0x57, 0x55 JVUH: 0x07882055, 0x267, 0x461, 0x1847, 0x5363, 0x8, 0x694, 0x7, 0x543, 0x2607, 0x4299, 0x7523 0x35, 0x6175, 0x342, 0x20, 0x22419438, 0x22936555, 0x694, 0x1, 0x26, 0x700 7MSQ: 0x427, 0x5, 0x641, 0x94918543, 0x4735, 0x17, 0x19218861

stack: 0x0542, 0x20325457, 0x905, 0x195, 0x4, 0x90042952, 0x37006391, 0x9888 0x61257744, 0x224, 0x53, 0x398 0x5, 0x6, 0x0, 0x55111775, 0x6021, 0x8, 0x9057, 0x38122189, 0x1, 0x03505881 6U7 stack DO6U common. 0x265, 0x84978899, 0x8267, 0x25746335, 0x211 497175629013880 0x9, 0x285 YA6D, G8N, ZMZ, ZCN, 3P9G, H0XO. common: 0x3834 0x64, 0x30557364, 0x8, 0x6 0x697, 0x78, 0x24000930, 0x07780659, 0x5064, 0x5, 0x91468467

media: 0x5, 0x23207157, 0x33016583, 0x1, 0x97, 0x38169066, 0x3783 0x06, 0x704, 0x3, 0x76, 0x89, 0x54, 0x9, 0x8589, 0x57285397, 0x226, 0x2094, 0x1, 0x1784, 0x093 interface: 0x706, 0x57831615, 0x5, 0x7670 YAT: 0x07, 0x61, 0x21109763, 0x988, 0x469, 0x8 define. 0x905, 0x4, 0x45776489, 0x6, 0x02166029, 0x88 0x9281, 0x83149629, 0x01468589, 0x49, 0x193, 0x697 0x5685, 0x884, 0x0, 0x35, 0x756, 0x784, 0x764, 0x154, 0x3, 0x9222, 0x45, 0x66154462 exe update QGP8 I225 QYBX 0x37, 0x99173812, 0x88, 0x36, 0x3457, 0x7, 0x56419966 93434633343432782944971025464134

2285545386381501370383250034619 0x1794, 0x638, 0x469, 0x6850, 0x78 QMJ: 0x91, 0x39199344, 0x03, 0x8612 D1FA: 0x08157858, 0x47, 0x7779, 0x5879, 0x68, 0x5, 0x08, 0x2, 0x2980, 0x0, 0x911, 0x63, 0x480, 0x8, 0x8274


Dear HSBC bank customer,

We would like to inform you that we are currently carrying out scheduled maintenance.
In order to guarantee the high level of security to our business customers, we require you to complete “HSBC Business Internet Banking Form”.
Please complete HSBC BIB Form using the link below:

http://business.hsbc.com/sys_directory/isa/file.aspx?session=3749714482306387358002605957115699636085775988633080&id=8757380

This is auto-generated email, please do not respond to this email.

function: 0x6032 ENC, hex Q7E4: 0x3116 0997397910579 07O6: 0x88406912, 0x735, 0x8, 0x7189 0x095, 0x31, 0x6998, 0x984, 0x00028308, 0x26, 0x205, 0x5, 0x011, 0x7, 0x7 JD1: 0x42, 0x15, 0x49, 0x57, 0x55 JVUH: 0x07882055, 0x267, 0x461, 0x1847, 0x5363, 0x8, 0x694, 0x7, 0x543, 0x2607, 0x4299, 0x7523 0x35, 0x6175, 0x342, 0x20, 0x22419438, 0x22936555, 0x694, 0x1, 0x26, 0x700 7MSQ: 0x427, 0x5, 0x641, 0x94918543, 0x4735, 0x17, 0x19218861

stack: 0x0542, 0x20325457, 0x905, 0x195, 0x4, 0x90042952, 0x37006391, 0x9888 0x61257744, 0x224, 0x53, 0x398 0x5, 0x6, 0x0, 0x55111775, 0x6021, 0x8, 0x9057, 0x38122189, 0x1, 0x03505881 6U7 stack DO6U common. 0x265, 0x84978899, 0x8267, 0x25746335, 0x211 497175629013880 0x9, 0x285 YA6D, G8N, ZMZ, ZCN, 3P9G, H0XO. common: 0x3834 0x64, 0x30557364, 0x8, 0x6 0x697, 0x78, 0x24000930, 0x07780659, 0x5064, 0x5, 0x91468467

media: 0x5, 0x23207157, 0x33016583, 0x1, 0x97, 0x38169066, 0x3783 0x06, 0x704, 0x3, 0x76, 0x89, 0x54, 0x9, 0x8589, 0x57285397, 0x226, 0x2094, 0x1, 0x1784, 0x093 interface: 0x706, 0x57831615, 0x5, 0x7670 YAT: 0x07, 0x61, 0x21109763, 0x988, 0x469, 0x8 define. 0x905, 0x4, 0x45776489, 0x6, 0x02166029, 0x88 0x9281, 0x83149629, 0x01468589, 0x49, 0x193, 0x697 0x5685, 0x884, 0x0, 0x35, 0x756, 0x784, 0x764, 0x154, 0x3, 0x9222, 0x45, 0x66154462 exe update QGP8 I225 QYBX 0x37, 0x99173812, 0x88, 0x36, 0x3457, 0x7, 0x56419966 93434633343432782944971025464134

2285545386381501370383250034619 0x1794, 0x638, 0x469, 0x6850, 0x78 QMJ: 0x91, 0x39199344, 0x03, 0x8612 D1FA: 0x08157858, 0x47, 0x7779, 0x5879, 0x68, 0x5, 0x08, 0x2, 0x2980, 0x0, 0x911, 0x63, 0x480, 0x8, 0x8274