HEX
Server: Apache
System: Linux zacp120.webway.host 4.18.0-553.50.1.lve.el8.x86_64 #1 SMP Thu Apr 17 19:10:24 UTC 2025 x86_64
User: govancoz (1003)
PHP: 8.3.26
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/govancoz/mail/.spam/new/1722142220.M516764P421393.zacp120.ve.host,S=5708,W=5826
Return-Path: <recep@govan.co.za>
Delivered-To: govancoz+spam@zacp120.ve.host
Received: from zacp120.ve.host
	by zacp120.ve.host with LMTP
	id CI+kHgzOpWYRbgYAvcbEzQ
	(envelope-from <recep@govan.co.za>)
	for <govancoz+spam@zacp120.ve.host>; Sun, 28 Jul 2024 06:50:20 +0200
Return-path: <recep@govan.co.za>
Envelope-to: recep@govan.co.za
Delivery-date: Sun, 28 Jul 2024 06:50:20 +0200
Received: from [84.54.72.49] (port=64835)
	by zacp120.ve.host with esmtp (Exim 4.97.1)
	(envelope-from <recep@govan.co.za>)
	id 1sXvrK-00000001lcR-2YxP
	for recep@govan.co.za;
	Sun, 28 Jul 2024 06:50:20 +0200
Received: from xwfnhmp ([29.2.72.137]) by 16419.com with MailEnable ESMTP; Sun, 28 Jul 2024 09:50:15 +0500
Received: (qmail 21766 invoked by uid 217); 28 Jul 2024 09:50:13 +0500
From: recep@govan.co.za
To: recep@govan.co.za
Date: Sun, 28 Jul 2024 09:50:15 +0500
Message-ID: <217667.217667@16419.com>
Mime-Version: 1.0
Content-type: text/plain;
X-Spam-Status: Yes, score=14.8
X-Spam-Score: 148
X-Spam-Bar: ++++++++++++++
X-Spam-Report: Spam detection software, running on the system "zacp120.ve.host",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  Hello there! Unfortunately, there are some bad news for you.
    Some time ago your device was infected with my private trojan, R.A.T (Remote
    Administration Tool), if you want to find out more about it simply use Google.
    
 Content analysis details:   (14.8 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was
                             blocked.  See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: cex.io]
  0.5 SUBJ_ALL_CAPS          Subject is all capitals
  1.5 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)
  0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE:
                             The query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                            [84.54.72.49 listed in sa-trusted.bondedsender.org]
  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [84.54.72.49 listed in bl.score.senderscore.com]
  2.0 PYZOR_CHECK            Listed in Pyzor
                             (https://pyzor.readthedocs.io/en/latest/)
  0.2 KAM_DMARC_NONE         DKIM has Failed or SPF has failed on the message
                             and the domain has no DMARC policy
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  0.0 KAM_SHORT              Use of a URL Shortener for very short URL
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  0.0 FSL_BULK_SIG           Bulk signature with no Unsubscribe
  0.5 PDS_BTC_ID             FP reduced Bitcoin ID
  3.5 BITCOIN_TOEQFM         Bitcoin + To same as From
  0.2 BITCOIN_SPAM_07        BitCoin spam pattern 07
  1.9 BITCOIN_MALWARE        BitCoin + malware bragging
  2.4 MALWARE_NORDNS         Malware bragging + no rDNS
X-Spam-Flag: YES
Subject:  ***SPAM***  I RECORDED YOU!

Hello there!

Unfortunately, there are some bad news for you.

Some time ago your device was infected with my private trojan, R.A.T (Remote Administration Tool), if you want to find out more about it simply use Google.

My trojan allowed me to access your files, accounts and your cam.

Check the sender of this email, I have sent it from your email account.

To make sure you read this email, you will receive it multiple times.

You truly enjoy checking out porn websites and watching dirty videos, while having a lot of kinky fun.

I RECORDED YOU (through the cam of your device) SATISFYING YOURSELF!

After that I removed my malware to not leave any traces.

If you still doubt my serious intentions, it only takes couple mouse clicks to share the video of you with your friends, relatives, all email contacts, on social networks and the darknet.

All you need is $1800 USD in Bitcoin (BTC) transfer to my account.

After the transaction is successful, I will proceed to delete everything.

Be sure, I keep my promises.

You can easily buy Bitcoin (BTC) here:

https://cex.io/buy-bitcoins https://nexo.com/buy-crypto/bitcoin-btc https://bitpay.com/buy-bitcoin/?crypto=BTC https://paybis.com/ https://invity.io/buy-crypto

Or simply google other exchanger.

After that send the Bitcoin (BTC) directly to my wallet, or install the free software: Atomicwallet, or: Exodus wallet, then receive and send to mine.

My Bitcoin (BTC) address is: 1GtGZpzfRkAVBL48F68mi8bTcatwpTZGm8

Yes, that's how the address looks like, copy and paste my address, it's (cAsE-sEnSEtiVE).

You are given not more than 3 days after you have opened this email.

As I got access to this email account, I will know if this email has already been read.

Everything will be carried out based on fairness.

An advice from me, regularly change all your passwords to your accounts and update your device with newest security patches.