LittleDemon WebShell


Linux server.clickboxgo.com 3.10.0 #1 SMP Mon Sep 30 15:36:27 MSK 2024 x86_64
Path : /home/clickboxgo/mail/new/
File Upload :
Command :
Current File : /home/clickboxgo/mail/new/1733733905.M507492P31146.server.clickboxgo.com,S=5896,W=6015

Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from server.clickboxgo.com
	by server.clickboxgo.com with LMTP
	id L+BzHRGuVmeqeQAA2xCSNQ
	(envelope-from <[email protected]>)
	for <[email protected]>; Mon, 09 Dec 2024 03:45:05 -0500
Return-path: <[email protected]>
Envelope-to: [email protected]
Delivery-date: Mon, 09 Dec 2024 03:45:05 -0500
Received: from [91.90.218.165] (port=63641)
	by server.clickboxgo.com with esmtp (Exim 4.96.2)
	(envelope-from <[email protected]>)
	id 1tKZNv-00084x-2K
	for [email protected];
	Mon, 09 Dec 2024 03:45:05 -0500
Received: from xqpycao ([182.180.170.215]) by 95844.com with MailEnable ESMTP; Mon, 9 Dec 2024 13:44:56 +0500
Received: (qmail 24646 invoked by uid 246); 9 Dec 2024 13:44:54 +0500
From: John Blue <[email protected]>
To: [email protected]
Date: Mon, 9 Dec 2024 13:44:56 +0500
Message-ID: <[email protected]>
Mime-Version: 1.0
Content-type: text/plain;
X-Spam-Status: Yes, score=15.2
X-Spam-Score: 152
X-Spam-Bar: +++++++++++++++
X-Spam-Report: Spam detection software, running on the system "server.clickboxgo.com",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  Hi, today I have some sad news for you. Your device was infected
    with my private malware. Your browser wasn't updated, in this case, it is
    enough to just visit a website where my iframe is placed to get automatically
    infected. 
 Content analysis details:   (15.2 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was
                             blocked.  See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: invity.io]
  0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [91.90.218.165 listed in sa-accredit.habeas.com]
  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [91.90.218.165 listed in bl.score.senderscore.com]
  0.5 SUBJ_ALL_CAPS          Subject is all capitals
  1.5 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)
  1.0 MAILBABY_GENERIC_IXHASH BODY: iXhash found @
                             mailbaby.ixhashgeneric.interserver.net
  4.0 MAILBABY_IXHASH        BODY: iXhash found @
                             mailbaby.ixhash.interserver.net
  2.0 PYZOR_CHECK            Listed in Pyzor
                             (https://pyzor.readthedocs.io/en/latest/)
  0.2 KAM_DMARC_NONE         DKIM has Failed or SPF has failed on the message
                             and the domain has no DMARC policy
  0.0 KAM_SHORT              Use of a URL Shortener for very short URL
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  0.5 PDS_BTC_ID             FP reduced Bitcoin ID
  0.0 FSL_BULK_SIG           Bulk signature with no Unsubscribe
  3.4 BITCOIN_EXTORT_01      Extortion spam, pay via BitCoin
X-Spam-Flag: YES
Subject:  ***SPAM***  I RECORDED YOU

Hi, today I have some sad news for you.

Your device was infected with my private malware.

Your browser wasn't updated, in this case, it is enough to just visit a website where my iframe is placed to get automatically infected.

If you want to find out more, Google: Drive-by exploit.

My malware has given me full access to all your accounts, complete control over your device, and it was also possible to spy on you through your camera.

If you think this is some bad joke, no, I know your password: rcEgEhSn8Mwc

I collected all your private data and I RECORDED YOU (through your camera) SATISFYING YOURSELF!

After that, I removed my malware to leave no traces, this email was sent from a hacked server.

I can publish the video of you and all your private data on the whole web, the darknet, social networks, over email, and send everything to all your contacts.

You can stop me, and only I can help you in this situation.

The only way to stop me is to pay exactly $800 in Bitcoin (BTC).

It's a very good offer compared to all the horrible things that will happen if I publish everything.

You can easily buy Bitcoin (BTC) here:

https://cex.io/buy-bitcoins https://nexo.com/buy-crypto/bitcoin-btc https://bitpay.com/buy-bitcoin/?crypto=BTC https://paybis.com/ https://invity.io/buy-crypto

You can send the Bitcoin (BTC) directly to my wallet, or install the free software: Atomic Wallet or Exodus Wallet, then receive and send to mine.

My Bitcoin (BTC) wallet address is: 1K67dnYSuzJEKQbGWxkPoDvbzfHLF3Lzxs

Yes, that's how the wallet/address looks, copy and paste it, it's (cAsE-sEnSEtiVE).

I give you 3 days to pay.

Since I have access to this email account, I will know if this email has already been read.

After receiving the payment, I will remove everything, and you can live your life in peace like before.

Don't worry; I keep my promise!

Next time, make sure that your device has the latest security updates.

ClientMailID: 2464670

LittleDemon - FACEBOOK
[ KELUAR ]