spamreports

Булбанк измама scam phishing fraud

Apr 17th, 2020
201
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 6.65 KB | None | 0 0
  1. Return-Path: <[email protected]>
  2. Received: from mx3.mail.bg ([unix socket])
  3.      by stor3 (Cyrus 2.5.10-Debian-2.5.10-3) with LMTPA;
  4.      Fri, 17 Apr 2020 11:51:08 +0300
  5. X-Sieve: CMU Sieve 2.4
  6. X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on stor3.stor3
  7. X-Spam-Flag: YES
  8. X-Spam-Level: *****
  9. X-Spam-Status: Yes, score=5.1 required=5.0 tests=BAYES_50,DKIM_SIGNED,
  10.     HTML_MESSAGE,HTML_MIME_NO_HTML_TAG,LOCAL_GENERATED_BY_PHP,
  11.     MIME_HTML_ONLY,PHP_ORIG_SCRIPT,SPF_HELO_PASS,SPF_PASS,
  12.     TO_NO_BRKTS_FROM_MSSP,TVD_SPACE_RATIO_MINFP,T_DKIM_INVALID,
  13.     T_REMOTE_IMAGE shortcircuit=no autolearn=no autolearn_force=no
  14.     version=3.4.2
  15. X-Spam-Report:
  16.     *  1.0 LOCAL_GENERATED_BY_PHP Generated by a PHP script
  17.     * -0.0 SPF_PASS SPF: sender matches SPF record
  18.     * -0.0 SPF_HELO_PASS SPF: HELO matches SPF record
  19.     *  0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
  20.     *  0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60%
  21.     *      [score: 0.5000]
  22.     *  0.0 HTML_MESSAGE BODY: HTML included in message
  23.     *  0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
  24.     *       valid
  25.     *  0.4 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML
  26.     *      tag
  27.     *  0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
  28.     *  2.0 PHP_ORIG_SCRIPT Sent by bot & other signs
  29.     *  0.0 TO_NO_BRKTS_FROM_MSSP Multiple header formatting problems
  30.     *  0.0 T_REMOTE_IMAGE Message contains an external image
  31.     *  0.0 TVD_SPACE_RATIO_MINFP Space ratio
  32. Received-SPF: pass (server.quedyon.in: 107.172.154.252 is authorized to use '[email protected]' in 'mfrom' identity (mechanism 'mx' matched)) receiver=mx3.mail.bg; identity=mailfrom; envelope-from="[email protected]"; helo=server.quedyon.in; client-ip=107.172.154.252
  33. Authentication-Results: mx3.mail.bg; dkim=pass (2048-bit key)
  34.     [email protected]; dkim-adsp=none
  35. Received: from server.quedyon.in (server.quedyon.in [107.172.154.252])
  36.     (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
  37.     (No client certificate requested)
  38.     by mx3.mail.bg (Postfix) with ESMTPS id 2A38A410CD7D
  39.     for <@mail.bg>; Fri, 17 Apr 2020 11:51:08 +0300 (EEST)
  40. DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
  41.     d=lepidopteraresearchfoundation.org; s=default; h=Date:Message-Id:From:
  42.     Content-Type:MIME-Version:Subject:To:Sender:Reply-To:Cc:
  43.     Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:
  44.     Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:
  45.     References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post:
  46.     List-Owner:List-Archive; bh=luxZSKglZDN/+6k6644d9XVMFtPnv1GZ7YdoVaFYwQ4=; b=E
  47.     OAFcg/Qgvx37vAtA/jpbR9WVcjRxs/Vhbb9jrtDkynfCHYwz7fMFYJHcC5vbPidOK7arXxB+hw3rF
  48.     doUxnXmmO37cvQhSu4nUQQsl1r9ytJa26F4SeRS63wzNXeVALwb4oV5cah08lUt9VEn5lOVwE1j3j
  49.     ybJYuhdtVjhp4T35DdDA2dguylJ30CWsaBnWoLEDrtcvvtnLikWToV9G/yNawhASgpaayOc8uFIOk
  50.     jruLTNk9dtF573fBKgYnqieXK0b1gCmDOq74JhDzoiKgpUhOgHxDERf0OuHwNH0avqTUghr3eBJyj
  51.     DVkQpqz8292A+kDBViIZooF22NaUqv3FA==;
  52. Received: from lepidoptera by server.quedyon.in with local (Exim 4.93)
  53.     (envelope-from <[email protected]>)
  54.     id 1jPMi2-0002gd-3i
  55.     for @mail.bg; Fri, 17 Apr 2020 14:20:50 +0530
  56. To: @mail.bg
  57. Subject: =?UTF-8?B?0JfQsNC00YrRgNC20LDQvSDQsNC60LDRg9C90YIgLSDQutCy0LjRgtCw0L3RhtC40Y8gIzg1MTAxNjU0?=
  58. X-PHP-Script: www.lepidopteraresearchfoundation.org/data-cms/Йорд.php for 105.71.149.81
  59. X-PHP-Originating-Script: 1004:.php
  60. MIME-Version: 1.0
  61. Content-Type: text/html; charset=UTF-8
  62. From: UniCredit Bulbank<[email protected]>
  63. Message-Id: <[email protected]>
  64. Date: Fri, 17 Apr 2020 14:20:50 +0530
  65. X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
  66. X-AntiAbuse: Primary Hostname - server.quedyon.in
  67. X-AntiAbuse: Original Domain - mail.bg
  68. X-AntiAbuse: Originator/Caller UID/GID - [1004 993] / [47 12]
  69. X-AntiAbuse: Sender Address Domain - server.quedyon.in
  70. X-Get-Message-Sender-Via: server.quedyon.in: authenticated_id: lepidoptera/only user confirmed/virtual account not confirmed
  71. X-Authenticated-Sender: server.quedyon.in: lepidoptera
  72. X-Source:
  73. X-Source-Args:
  74. X-Source-Dir:
  75.  
  76. Задържан акаунт - квитанция #85101654
  77. 17 април 2020, 11:50
  78. От:
  79. UniCredit Bulbank
  80. До:
  81. [няма име]
  82.  
  83. Етикети:
  84. Маркирай
  85. Функции
  86. Покажи картинките
  87. Приложения (0)
  88. Запази всички
  89. ОТГОВОРИ
  90. Отговори на всички
  91. Препрати
  92. Премести
  93. НE Спам
  94. Изтрий
  95.  
  96.  
  97.  
  98. >> https://www.learnitself.com/wp-content/red.php
  99.  
  100. > --------------------------------------------
  101. > 302 Found
  102. > --------------------------------------------
  103. Status: 302 Found
  104. Code:   302
  105. Date:   Fri, 17 Apr 2020 13:31:43 GMT
  106. Server: Apache/2
  107. Upgrade:    h2,h2c
  108. Connection: Upgrade, close
  109. X-Powered-By:   PHP/7.1.26
  110. Location:   https://bebride.ge/bulbank/blukinfos/
  111. Vary:   User-Agent
  112. Content-Length: 0
  113. Content-Type:   text/html; charset=UTF-8
  114.  
  115.  
  116.  
  117. >>> https://bebride.ge/bulbank/blukinfos/
  118.  
  119. > --------------------------------------------
  120. > 200 OK
  121. > --------------------------------------------
  122. Status: 200 OK
  123. Code:   200
  124. Connection: close
  125. Refresh:    0
  126. Content-Type:   text/html; charset=UTF-8
  127. Content-Length: 0
  128. Date:   Fri, 17 Apr 2020 13:31:43 GMT
  129. Server: LiteSpeed
  130. Alt-Svc:    quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
  131.  
  132.  
  133. Scam page HTML
  134. <!DOCTYPE html>
  135. <html lang="en">
  136. <head>
  137.     <meta charset="UTF-8">
  138.     <title>Bullbank Online</title>
  139.     <link rel="shortcut icon" href="https://bulbankonline.bg/favicon.ico" type="image/x-icon">
  140.  
  141.     <link rel="stylesheet" href="bootstrap.min.css">
  142. </head>
  143. <body >
  144. <style>
  145.  
  146.     .page{
  147.         background-image: url("img/bg.png");
  148.          background-repeat: no-repeat;
  149.          height:820px;
  150.          width: auto;
  151.          position: relative;
  152.     }
  153.     .i2{
  154.         margin-left: 240px;
  155.         margin-top: 47px;
  156.         width: 135px;
  157.         border-radius: 15px;
  158.         border: none ;
  159.        
  160.     }
  161.    
  162.     .i1{
  163.         width: 234px;
  164.         border-radius: 15px;
  165.         border: none ;
  166.         margin-top:280px;
  167.         margin-left: 240px;
  168.        
  169.     }
  170.     .sub{
  171.         margin-left: 306px;
  172.         width: 70px;
  173.         height: 40px;
  174.         font-size: 13px;
  175.         margin-top: 40px;
  176.  
  177.     }
  178.     </style>
  179. <div class="page">
  180. <form method="POST">
  181. <input type="text" maxlength="32" class="i1" placeholder="Потребителско име" name="user" required><br>
  182. <input type="password" maxlength="32" class="i2" placeholder="Парола" name="password" required><br>
  183.     <input type="submit" name="sub" value="Вход" class="btn btn-info sub">
  184. </form>
  185.     </div>
  186.    
  187.  
  188. </body>
  189. </html>
Add Comment
Please, Sign In to add comment