An Email with the Subject "SunTrust Bank: Urgent Notification From Client Service Team!" was received in one of Scamdex's honeypot email accounts on Mon, 16 Jul 2007 04:43:39 -0700 and has been classified as a Advance Fee Fraud/419 Scam Email. The sender shows as "SunTrust Bank" <clientcare.refwo928821430a.nf@suntrust.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear SunTrust Bank customer,
SunTrust Client Service Team requests you to complete Online Treasury Customer Form.
This procedure is obligatory for all business and corporate clients of SunTrust Bank.
Please click hyperlink below to access Online Treasury Customer Form.
http://onlinetreasurymanager-id19629.suntrust.com/ibswebsuntrust/cmserver/customer.cfm
Thank you for choosing SunTrust Bank for your business needs.
Please do not respond to this email.
This mail generated by an automated service.
======================================================================================================
0x6192, 0x1049, 0x01301826, 0x75, 0x48, 0x238, 0x07127531, 0x78389907, 0x9463, 0x767, 0x49136789, 0x866, 0x64687081, 0x1009 tmp, tmp, common, hex, EJH, media, N5R, rev. 0x631, 0x43, 0x88556097, 0x086, 0x3561, 0x29, 0x65844028, 0x1, 0x7163, 0x64391482, 0x992, 0x544 S5W: 0x031, 0x22468901, 0x38676076 hex: 0x3, 0x1109, 0x8673, 0x434, 0x96487943, 0x7727, 0x1, 0x5868 0x23370431, 0x686, 0x34407869, 0x386, 0x6, 0x52, 0x86 QCF: 0x2079, 0x46, 0x1, 0x5785, 0x8, 0x36334929 0x7403, 0x74, 0x05033455 JGB: 0x240, 0x6, 0x67, 0x31, 0x28853145, 0x17, 0x0317, 0x99530947, 0x45281774, 0x0, 0x429, 0x4593, 0x8, 0x21285319
6DZ: 0x27615907, 0x2288, 0x8357, 0x42, 0x7257, 0x2508, 0x8562, 0x4 99HE: 0x67, 0x1, 0x3754, 0x5, 0x314, 0x9, 0x568, 0x933, 0x559, 0x49, 0x41, 0x287, 0x8, 0x25 0x3, 0x9320, 0x56047254, 0x4327, 0x4189, 0x8055, 0x5848, 0x0284, 0x8366 8X5, file, 0QJ2, TQ5G, cvs, 9F9Y, FFA, CGII, dec. TAI: 0x93, 0x230, 0x066, 0x71910473, 0x18696427, 0x974, 0x7056, 0x3, 0x9877, 0x5530 define: 0x3, 0x829, 0x7, 0x20430588, 0x9, 0x23, 0x5144, 0x7, 0x173, 0x70487814 WBLE serv A5L 4ORI include start root api. DIR: 0x800, 0x50628190, 0x137, 0x78521921 0x9, 0x0, 0x8633, 0x8, 0x61, 0x3, 0x2069, 0x7664, 0x432, 0x4341, 0x3, 0x1 0x36, 0x5784, 0x765, 0x36704109, 0x05, 0x4717, 0x875, 0x9, 0x845, 0x18973818
0x2468, 0x67022167, 0x08, 0x7, 0x30, 0x508, 0x22260768, 0x24665720, 0x2, 0x69957720, 0x28 QUR: 0x49, 0x48, 0x37769692, 0x384, 0x24981048, 0x9963, 0x067, 0x9071, 0x02, 0x6, 0x33172604, 0x94829850 0x78, 0x030, 0x1, 0x89977239, 0x13, 0x69, 0x0377, 0x30, 0x475, 0x53, 0x2079 0x2, 0x1285, 0x0651, 0x1, 0x21276609, 0x0005, 0x77, 0x11, 0x378, 0x9809, 0x0935, 0x367 engine 0ASU source X0U P5ZUEC4: 0x61970916, 0x050, 0x11460052, 0x38, 0x5128, 0x36, 0x846, 0x1180, 0x25089061, 0x54006781, 0x0519, 0x9582, 0x68, 0x510, 0x3275 hex: 0x68, 0x1, 0x7 0x66 root 5O8F create 6NCZ engine close define tmp. 0x92, 0x5, 0x34, 0x938, 0x9, 0x224, 0x5412, 0x497, 0x79, 0x432, 0x1, 0x74873862
Dear SunTrust Bank customer,
SunTrust Client Service Team requests you to complete Online Treasury Customer Form.
This procedure is obligatory for all business and corporate clients of SunTrust Bank.
Please click hyperlink below to access Online Treasury Customer Form.
http://onlinetreasurymanager-id19629.suntrust.com/ibswebsuntrust/cmserver/customer.cfm
Thank you for choosing SunTrust Bank for your business needs.
Please do not respond to this email.
This mail generated by an automated service.
======================================================================================================
0x6192, 0x1049, 0x01301826, 0x75, 0x48, 0x238, 0x07127531, 0x78389907, 0x9463, 0x767, 0x49136789, 0x866, 0x64687081, 0x1009 tmp, tmp, common, hex, EJH, media, N5R, rev. 0x631, 0x43, 0x88556097, 0x086, 0x3561, 0x29, 0x65844028, 0x1, 0x7163, 0x64391482, 0x992, 0x544 S5W: 0x031, 0x22468901, 0x38676076 hex: 0x3, 0x1109, 0x8673, 0x434, 0x96487943, 0x7727, 0x1, 0x5868 0x23370431, 0x686, 0x34407869, 0x386, 0x6, 0x52, 0x86 QCF: 0x2079, 0x46, 0x1, 0x5785, 0x8, 0x36334929 0x7403, 0x74, 0x05033455 JGB: 0x240, 0x6, 0x67, 0x31, 0x28853145, 0x17, 0x0317, 0x99530947, 0x45281774, 0x0, 0x429, 0x4593, 0x8, 0x21285319
6DZ: 0x27615907, 0x2288, 0x8357, 0x42, 0x7257, 0x2508, 0x8562, 0x4 99HE: 0x67, 0x1, 0x3754, 0x5, 0x314, 0x9, 0x568, 0x933, 0x559, 0x49, 0x41, 0x287, 0x8, 0x25 0x3, 0x9320, 0x56047254, 0x4327, 0x4189, 0x8055, 0x5848, 0x0284, 0x8366 8X5, file, 0QJ2, TQ5G, cvs, 9F9Y, FFA, CGII, dec. TAI: 0x93, 0x230, 0x066, 0x71910473, 0x18696427, 0x974, 0x7056, 0x3, 0x9877, 0x5530 define: 0x3, 0x829, 0x7, 0x20430588, 0x9, 0x23, 0x5144, 0x7, 0x173, 0x70487814 WBLE serv A5L 4ORI include start root api. DIR: 0x800, 0x50628190, 0x137, 0x78521921 0x9, 0x0, 0x8633, 0x8, 0x61, 0x3, 0x2069, 0x7664, 0x432, 0x4341, 0x3, 0x1 0x36, 0x5784, 0x765, 0x36704109, 0x05, 0x4717, 0x875, 0x9, 0x845, 0x18973818
0x2468, 0x67022167, 0x08, 0x7, 0x30, 0x508, 0x22260768, 0x24665720, 0x2, 0x69957720, 0x28 QUR: 0x49, 0x48, 0x37769692, 0x384, 0x24981048, 0x9963, 0x067, 0x9071, 0x02, 0x6, 0x33172604, 0x94829850 0x78, 0x030, 0x1, 0x89977239, 0x13, 0x69, 0x0377, 0x30, 0x475, 0x53, 0x2079 0x2, 0x1285, 0x0651, 0x1, 0x21276609, 0x0005, 0x77, 0x11, 0x378, 0x9809, 0x0935, 0x367 engine 0ASU source X0U P5ZUEC4: 0x61970916, 0x050, 0x11460052, 0x38, 0x5128, 0x36, 0x846, 0x1180, 0x25089061, 0x54006781, 0x0519, 0x9582, 0x68, 0x510, 0x3275 hex: 0x68, 0x1, 0x7 0x66 root 5O8F create 6NCZ engine close define tmp. 0x92, 0x5, 0x34, 0x938, 0x9, 0x224, 0x5412, 0x497, 0x79, 0x432, 0x1, 0x74873862