I have noticed that a lot of spam messages change their mime boundary during the message.
So in the headers they specify something like:

MIME-Version: 1.0
Content-Type: multipart/related;
        type="multipart/alternative";
        boundary="----=_NextPart_000_0005_01C6DC77.1B7CF1F0"

But then the first mime part is empty and changes the mime boundary:

------=_NextPart_000_0005_01C6DC77.1B7CF1F0
Content-Type: multipart/alternative;
        boundary="----=_NextPart_001_0006_01C6DC77.1B7CF1F0"

They then have two mime parts with this new mime boundary, first a text and then an html mime part:

------=_NextPart_001_0006_01C6DC77.1B7CF1F0
Content-Type: text/plain;
        charset="windows-1250"
Content-Transfer-Encoding: quoted-printable

[Text Content]

------=_NextPart_001_0006_01C6DC77.1B7CF1F0
Content-Type: text/html;
        charset="windows-1250"
Content-Transfer-Encoding: quoted-printable

[HTML Content]

------=_NextPart_001_0006_01C6DC77.1B7CF1F0--

They then revert back to the original mime boundary for the image spam mime part:

------=_NextPart_000_0005_01C6DC77.1B7CF1F0
Content-Type: image/gif;
        name="fighting.gif"
Content-Transfer-Encoding: base64
Content-ID: <[EMAIL PROTECTED]>

[image]

------=_NextPart_000_0005_01C6DC77.1B7CF1F0--

Does this happen in legitimate emails as well?
I have never seen this in a legit email, however i do spend far longer looking at spam then i do ham.

Perhaps someone has already written a rule for this behaviour.
If so, could someone point me in the right direction to get it?

Thanks
Ben

Reply via email to