Your Pending EFT Payment!!!
[Previous Example] [Share This Page] [Back To The Main SHPAMEE Index] [Next Example]
VERY IMPORTANT INFORMATION, READ THIS FIRST: The example and associated information published on this page are subject to the SHPAMEE Terms Of Use. Please familiarise yourself with these terms before viewing or using any information on this page.
Header:
X-Account-Key: account2
X-UIDL: x
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
X-Mozilla-Keys:
X-Apparently-To: x via 212.82.111.163; Fri, 31 Aug 2012 06:06:57 +0000
X-YahooFilteredBulk: 176.53.58.187
Received-SPF: pass (domain of hybro.org designates 176.53.58.187 as permitted sender)
X-YMailISG: x
X-Originating-IP: [176.53.58.187]
Authentication-Results: mta1002.mail.ukl.yahoo.com from=absa.co.za; domainkeys=neutral (no sig); from=absa.co.za;
dkim=neutral (no sig)
Received: from 127.0.0.1 (EHLO server.alkinkasap.net) (176.53.58.187)
by mta1002.mail.ukl.yahoo.com with SMTP; Fri, 31 Aug 2012 06:06:57 +0000
Received: from apache by server.alkinkasap.net with local (Exim 4.76)
(envelope-from <hybro@hybro.org>)
id 1T7KKF-0001vp-Fz
for x; Fri, 31 Aug 2012 10:03:27 +0400
To: x
Subject: Your Pending EFT Payment!!!
X-PHP-Script: hybro.org/wp-content/themes/Avenue/cache/done.php for 41.18.64.200, 80.239.242.62
From: Absa Internet Banking <securepayment@absa.co.za>
Reply-To:
MIME-Version: 1.0
Content-Type: text/html
Content-Transfer-Encoding: 8bit
Message-Id: <x@server.alkinkasap.net>
Date: Fri, 31 Aug 2012 10:03:27 +0400
Body:
|
|
|
Comments:
Related Cyber Criminal Profiles:
No related profiles found.Similar Spam Examples:
ABSA Bank Phishing Scam - Authorized EFT Payment ReceivedABSA Excess Charges Refund Banking Phishing Scam
SARS Efiling / ABSA Payment Notification Phishing Scam
ABSA Banking Phishing Scam - 2012 - SARS PAYMENTS
Banking Phishing Scam - Absa Bank Electronic Statements Fees Deducted
Related Malware Samples:
No related malware samples found.[Previous Example] [Share This Page] [Back To The Main SHPAMEE Index] [Next Example]