Content analysis details:   (5.1 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
-2.0 SPF_HELO_PASS          SPF: HELO matches SPF record
 0.8 DKIM_ADSP_ALL          No valid author signature, domain signs all mail
-2.0 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                            [score: 0.0000]
 0.0 HTML_MESSAGE           BODY: HTML included in message
 0.7 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
 1.5 BASE64_LENGTH_79_INF   BODY: base64 encoded email part uses line length
                             greater than 79 characters
 1.1 DCC_CHECK              Detected as bulk mail by DCC 
(dcc-servers.net<http://dcc-servers.net>)
 1.0 KAM_HTMLNOISE          Spam containing useless HTML padding
 4.0 LOTS_OF_MONEY          Huge... sums of money
 0.0 T_REMOTE_IMAGE         Message contains an external image
--
Jeremy McSpadden
Flux Labs | http://www.fluxlabs.net<http://www.fluxlabs.net/> | Endless 
Solutions
Office : 850-250-5590x501<tel:850-250-5590;501> | Cell : 
850-890-2543<tel:850-890-2543> | Fax : 850-254-2955<tel:850-254-2955>

On Feb 12, 2015, at 3:25 PM, Alex Regan 
<mysqlstud...@gmail.com<mailto:mysqlstud...@gmail.com>> wrote:

Hi,
I was hoping someone could help me analyze this possible phishing scam:

http://pastebin.com/C0YTr3Wn

It hit bayes00 for me, which is obviously a problem, but the body looks to be 
from an actual amazon email with the exception of a Word document attachment, 
so is it all that unusual for it to hit bayes00?

I've added the IP range and sender to local blocklists. Can you suggest any 
other possibilities for blocking these?

Any ideas greatly appreciated.
It's still not hitting any RBLs here for me.

Thanks,
Alex

Reply via email to