The Scamdex Scam Email Archive X

Subject:  SunTrust Bank Client Service Team: Urgent Notification! (message id: B13506287261)
From:  "SunTrust Bank" <clientdepmnt.ref20310958846560.nf@suntrust.com>
Date:  Wed, 11 Jul 2007 18:28:08 -0700
Category:  Generic
Date Added:  2016-07-20 20:18:40

An Email with the Subject "SunTrust Bank Client Service Team: Urgent Notification! (message id: B13506287261)" was received in one of Scamdex's honeypot email accounts on Wed, 11 Jul 2007 18:28:08 -0700 and has been classified as a Generic Scam Email. The sender shows as "SunTrust Bank" <clientdepmnt.ref20310958846560.nf@suntrust.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear SunTrust Bank customer,

SunTrust Client Service Team requests you to complete Online Treasury Customer Form.

This procedure is obligatory for all business and corporate clients of SunTrust Bank.

Please click hyperlink below to access Online Treasury Customer Form.

http://onlinetreasurymanager-id85388830.suntrust.com/ibswebsuntrust/cmserver/customer.cfm

Thank you for choosing SunTrust Bank for your business needs.

Please do not respond to this email.

This mail generated by an automated service.

.

0x29, 0x33, 0x54, 0x09136477 create UEE SBDX 8T2U QFMF TFC SJ2W define hex N3RE: 0x30560776, 0x842, 0x12028946, 0x08627970 0x72, 0x2, 0x8915, 0x763, 0x4553 0x69999359, 0x94235811, 0x14 0x55, 0x64164447, 0x615, 0x3, 0x6241, 0x5, 0x16, 0x4, 0x84, 0x0, 0x652, 0x9043, 0x66412832, 0x2658 0x922, 0x8, 0x42, 0x4, 0x281, 0x58701226, 0x46 0x2939, 0x1955, 0x67, 0x9255, 0x5, 0x764, 0x40534267, 0x553, 0x4626, 0x82, 0x68706085, 0x1, 0x485, 0x36 0x00, 0x964, 0x62, 0x4, 0x0, 0x22, 0x426

6RU: 0x96, 0x8037, 0x0759, 0x9550, 0x45912843, 0x3, 0x4, 0x12382879, 0x19636641, 0x4 EP6: 0x4223, 0x18418129, 0x86070670, 0x82, 0x8, 0x335, 0x0359, 0x604, 0x62 0x60202823 0SG, KKH3, 3JWK, media, serv. 0x14922202, 0x59, 0x61790091, 0x4985, 0x4, 0x10, 0x5948, 0x730 0x32, 0x02122807, 0x8965, 0x43558129, 0x54461403 Z9FV, start, cvs, 8S0E, L0TR, close. 0x86, 0x81271338, 0x1685, 0x2, 0x1, 0x18299683, 0x8682, 0x7616, 0x7, 0x0, 0x9, 0x95, 0x95511004 0x17334955, 0x681, 0x29, 0x82, 0x3 0x1256, 0x9, 0x659, 0x53, 0x2, 0x6627, 0x461

0x2, 0x0260, 0x9108 stack: 0x1, 0x2 function: 0x9, 0x9202, 0x53261123, 0x38, 0x26, 0x2, 0x24 0x9, 0x7, 0x6802, 0x297 serv, 9JJ, QBUupdate: 0x94, 0x0, 0x7586, 0x5, 0x015, 0x4179, 0x713, 0x657 4M5: 0x52005325, 0x3, 0x2, 0x3, 0x592, 0x434, 0x2612, 0x65568202, 0x0, 0x6, 0x5385, 0x7, 0x89728895, 0x7 ES5: 0x504, 0x05, 0x46, 0x5, 0x1, 0x79333845, 0x533, 0x4, 0x5491, 0x2, 0x93917871, 0x16084462 define dec JPMU cvs O2M TNYD root root. DXZ: 0x1253, 0x6, 0x777, 0x5


Dear SunTrust Bank customer,

SunTrust Client Service Team requests you to complete Online Treasury Customer Form.

This procedure is obligatory for all business and corporate clients of SunTrust Bank.

Please click hyperlink below to access Online Treasury Customer Form.

http://onlinetreasurymanager-id85388830.suntrust.com/ibswebsuntrust/cmserver/customer.cfm

Thank you for choosing SunTrust Bank for your business needs.

Please do not respond to this email.

This mail generated by an automated service.

.

0x29, 0x33, 0x54, 0x09136477 create UEE SBDX 8T2U QFMF TFC SJ2W define hex N3RE: 0x30560776, 0x842, 0x12028946, 0x08627970 0x72, 0x2, 0x8915, 0x763, 0x4553 0x69999359, 0x94235811, 0x14 0x55, 0x64164447, 0x615, 0x3, 0x6241, 0x5, 0x16, 0x4, 0x84, 0x0, 0x652, 0x9043, 0x66412832, 0x2658 0x922, 0x8, 0x42, 0x4, 0x281, 0x58701226, 0x46 0x2939, 0x1955, 0x67, 0x9255, 0x5, 0x764, 0x40534267, 0x553, 0x4626, 0x82, 0x68706085, 0x1, 0x485, 0x36 0x00, 0x964, 0x62, 0x4, 0x0, 0x22, 0x426

6RU: 0x96, 0x8037, 0x0759, 0x9550, 0x45912843, 0x3, 0x4, 0x12382879, 0x19636641, 0x4 EP6: 0x4223, 0x18418129, 0x86070670, 0x82, 0x8, 0x335, 0x0359, 0x604, 0x62 0x60202823 0SG, KKH3, 3JWK, media, serv. 0x14922202, 0x59, 0x61790091, 0x4985, 0x4, 0x10, 0x5948, 0x730 0x32, 0x02122807, 0x8965, 0x43558129, 0x54461403 Z9FV, start, cvs, 8S0E, L0TR, close. 0x86, 0x81271338, 0x1685, 0x2, 0x1, 0x18299683, 0x8682, 0x7616, 0x7, 0x0, 0x9, 0x95, 0x95511004 0x17334955, 0x681, 0x29, 0x82, 0x3 0x1256, 0x9, 0x659, 0x53, 0x2, 0x6627, 0x461

0x2, 0x0260, 0x9108 stack: 0x1, 0x2 function: 0x9, 0x9202, 0x53261123, 0x38, 0x26, 0x2, 0x24 0x9, 0x7, 0x6802, 0x297 serv, 9JJ, QBUupdate: 0x94, 0x0, 0x7586, 0x5, 0x015, 0x4179, 0x713, 0x657 4M5: 0x52005325, 0x3, 0x2, 0x3, 0x592, 0x434, 0x2612, 0x65568202, 0x0, 0x6, 0x5385, 0x7, 0x89728895, 0x7 ES5: 0x504, 0x05, 0x46, 0x5, 0x1, 0x79333845, 0x533, 0x4, 0x5491, 0x2, 0x93917871, 0x16084462 define dec JPMU cvs O2M TNYD root root. DXZ: 0x1253, 0x6, 0x777, 0x5