hinet phish involving payment

Return-path:

Envelope-to: dave@doctor.nl2k.ab.ca

Delivery-date: Tue, 05 Sep 2023 14:15:04 -0600

Received: from doctor by doctor.nl2k.ab.ca with local (Exim 4.96 (FreeBSD))

(envelope-from )

id 1qdc76-000Lqy-2F

for dave@doctor.nl2k.ab.ca;

Tue, 05 Sep 2023 13:53:28 -0600

Resent-From: The Doctor

Resent-Date: Tue, 5 Sep 2023 13:53:28 -0600

Resent-Message-ID:

Resent-To: Dave Yadallee

Received: from 60-249-148-149.hinet-ip.hinet.net ([60.249.148.149]:56598 helo=secure.net)

by doctor.nl2k.ab.ca with esmtp (Exim 4.96 (FreeBSD))

(envelope-from )

id 1qdbWG-000MST-0B

for root@mail.nl2k.ab.ca;

Tue, 05 Sep 2023 13:15:31 -0600

From: Adobe_Share_Payment_Doc

To: root@mail.nl2k.ab.ca

Subject: ** VIRUS ***Merchant/Payroll (Invoice) Payment Document Via Adobe share

Date: 06 Sep 2023 03:13:00 +0800

Message-ID: <20230906031300.B1C1D83ABCA4E797@secure.net>

MIME-Version: 1.0

Content-Type: multipart/mixed;

boundary="----=_NextPart_000_0012_E2123A9E.CAC34C29"

X-Spam_score: 5.5

X-Spam_score_int: 55

X-Spam_bar: +++++

X-Spam_report: Spam detection software, running on the system "doctor.nl2k.ab.ca",

has identified this incoming email as possible spam. The original

message has been attached to this so you can view it or label

similar future email. If you have any questions, see

@@CONTACT_ADDRESS@@ for details.



Content preview: You’re all done. Attached is the final agreement for your

reference. You're required to sign EFT Invoice #7801 Payment Approved- Agreement

Attached is the final agreement for your approved EFT Invoice. The document

is encrypted and attached to your email for your safety.



Content analysis details: (5.5 points, 5.0 required)



pts rule name description

---- ---------------------- --------------------------------------------------

1.6 RCVD_IN_BRBL_LASTEXT RBL: No description available.

[60.249.148.149 listed in bb.barracudacentral.org]

1.9 URIBL_ABUSE_SURBL Contains an URL listed in the ABUSE SURBL blocklist

[URI: cdn.glitch.me]

0.0 TVD_RCVD_IP Message was received from an IP address

0.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or identical to

background

1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts

0.0 HTML_MESSAGE BODY: HTML included in message

-0.0 T_SCC_BODY_TEXT_LINE No description available.

0.0 T_HTML_ATTACH HTML attachment to bypass scanning?

0.4 RDNS_DYNAMIC Delivered to internal network by host with

dynamic-looking rDNS

0.0 KHOP_HELO_FCRDNS Relay HELO differs from its IP's reverse DNS

0.0 FILL_THIS_FORM Fill in a form with personal information

0.0 T_FILL_THIS_FORM_FRAUD_PHISH Answer suspicious question(s)

0.4 FILL_THIS_FORM_FRAUD_PHISH Answer suspicious question(s)

Subject: **
VIRUS ***{SPAM?} Merchant/Payroll (Invoice) Payment Document Via Adobe share

X-Antivirus: AVG (VPS 230905-4, 9/5/2023), Inbound message

X-Antivirus-Status: Infected

X-Attachment: Adobe_Approved_(Invoice)_Payment.html#1246483431 Virus: HTML:Phishing-CJK [Phish] Moved to chest



This is a multi-part message in MIME format.



------=_NextPart_000_0012_E2123A9E.CAC34C29

Content-Type: text/html;

charset="iso-8859-1"

Content-Transfer-Encoding: quoted-printable




=3DUTF-8"/>

ss=3D"_xWdq isFirstCard jCu2s" style=3D"PADDING-BOTTOM: 12px; PADDING-TOP: =

0px; PADDING-LEFT: 12px; MARGIN-LEFT: 8px; PADDING-RIGHT: 12px; MARGIN-RIGH=

T: 20px">




dex=3D0 aria-label=3D"Opens Profile Card for Pella Austin" class=3D"undefin=

ed lpc-hoverTarget" data-is-focusable=3D"true" data-lpc-hover-target-id=3D"=

react-target-v2-500">


coin-374">



&=

nbsp;
=




z8y1T GNqVo yxtKT allowTextSelection">














OR: #f0f0f0" cellSpacing=3D16 cellPadding=3D0 border=3D0>












cellSpacing=3D0 cellPadding=3D0 align=3Dcenter border=3D0>





=





















  3D"Adobe
images/emailNextGen/email-adobe-sign-logo.3@2x.png" width=3D165 data-imaget=

ype=3D"External">

R: #ffffff; LINE-HEIGHT: 18px" vAlign=3Dtop width=3D39 align=3Dright>
tyle=3D"DISPLAY: inline-block; BACKGROUND-COLOR: #ff0000" border=3D0 alt=3D=

Adobe src=3D"https://na4.documents.adobe.com/images/emailNextGen/email-adob=

e-tag-classic@2x.png" width=3D39 height=3D64 data-imagetype=3D"External"> <=

/TD>

 











IN-LEFT: auto; DISPLAY: block; MARGIN-RIGHT: auto" alt=3D"" src=3D"https://=

na4.documents.adobe.com/images/emailNextGen/checkmarkCircle@2x.png" data-im=

agetype=3D"External">



f; DISPLAY: none !important; LINE-HEIGHT: 1px; MAX-HEIGHT: 0px; VISIBILITY:=

hidden; opacity: 0">You’re all done. Attached is the final agreement=

for your reference.




GN: center; MARGIN: 0px">You're required to sign

=3Dtrue>EFT Invoice #7801 Payment Approved-  Agreement
>


GN: center; MARGIN: 0px"> 




GN: center; MARGIN: 0px"> 


















 




Attached is the final agreement for your appro=

ved EFT Invoice. The document is encrypted and attached to your email for y=

our safety.



ue>























3D"Powered
4.documents.adobe.com/images/emailNextGen/email-powered-by-adobe-sign-logo.=

3@2x.png" width=3D136 data-imagetype=3D"External">
 


To ensure that you continue receiving our =

emails, please add adobesign@adobesign.com to your address book or safe lis=

t.



© 2022 Adobe. All rights reserved.
>
; BORDER-RIGHT: 0px; BORDER-BOTTOM: 0px; COLOR: #ffffff; BORDER-LEFT: 0px; =

MAX-HEIGHT: 0px; VISIBILITY: hidden; opacity: 0" alt=3D"" src=3D"https://na=

4.documents.adobe.com/track/CBFCIBAA3AAABLblqZhCB1uUYUR8CgHBqPOmnOcTNtFnF9P=

nnh0GOzyn6YBCl8w0p22qLUNcqV0QwA3HxsYg*/blank.gif" data-imagetype=3D"Externa=

l">


V>




 


------=_NextPart_000_0012_E2123A9E.CAC34C29--



Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA