Help in analyzing a junk email solicited

Hello everybody and Happy Easter.

I need to ask for help. A customer of mine (and many people he knows as well as myself) are getting spam, the "typical" junk with just a link in the email. Always his email address is shown as the sender address.

I have tested his machine (XP SP3); MS Security Essentials, MalwareBytes and SuperAntiSpyware say the machine is clean. My machine (W7 SP1) is clean by the same tests as well and naturally we have never clicked on any of the links. We both use the Mozilla Thunderbird email client version 3.1.9.

I am not a networking guy beyond the basics and can not decipher what IP address (and email account?) the mails are originating from.

So I add the source of the mail in text format following this post hoping for help.

Thank you in advance. Eike
From - Sun Apr 24 17:33:24 2011
X-Account-Key: account1
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
X-Apparently-To: via; Sun, 24 Apr 2011 15:27:07 -0700
Received-SPF: none ( domain of does not designate permitted sender hosts)
X-YMailISG: RdRa0BYcZAqbZj3HW9bLq4Km65VL2O9BWxaNuJ_lIzOODqo2
X-Originating-IP: []
Authentication-Results:; domainkeys=pass (ok);; dkim=pass (ok)
Received: from  (EHLO (
  by with SMTP; Sun, 24 Apr 2011 15:27:07 -0700
Received: from ([])
          by (sccwmxc04) with SMTP
          id <20110424222706s0400io4a9e>; Sun, 24 Apr 2011 22:27:06 +0000
X-Originating-IP: []
Received: (qmail 56903 invoked by uid 60001); 24 Apr 2011 22:27:06 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=s1024; t=1303684026; bh=kttlTHIdys+9glH7u/CJvEoeaz4sdgMOQ7JdchLHNn4=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type; b=5qrRbIa6DnuzEtGxESfeMoJDArJjmXPIj9sH1OoI4cxySd4CnsfBLOLnFzzRU2Qzn045rysa4tvGGH2VSL7Hc1wMkJ4x5GHtRA+TQLwO8KjFfSl/OZrfTEQi/ZXePRSt+6mnhsKywciaQ5gZLCCd15h3zTxt8rXoPYKDbtBtS5E=
DomainKey-Signature:a=rsa-sha1; q=dns; c=nofws;
Message-ID: <>
X-YMail-OSG: L5nbghUVM1kiRBeQmswrxy5WDB66KCSXSzrsBLZvYwsNePr
Received: from [] by via HTTP; Sun, 24 Apr 2011 15:27:06 PDT
X-Mailer: YahooMailWebService/
Date: Sun, 24 Apr 2011 15:27:06 -0700 (PDT)
From: Larry Koltz <>
Subject: Re:4
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii       --- Do NOT click this link!

Who is Participating?
btanConnect With a Mentor Exec ConsultantCommented:
typically the source for the email comes from the "Received: from" and in this case it is which is another ISP ( Kuentos Communication in Guam.

Doesn't look so likely that your customer may have any dealing in that area (i supposed). Having said that, spam would forged "Received:" lines, intended to throw you off the trail. But the last one is normally the source.

Some sharing
- The "X-Apparently-To:" header line was added by '' to identify the SMTP "RCPT TO:" email address.
- The "X-YahooFilteredBulk:" header line was added by Yahoo! SpamGuard to tag this email as matching specific tests for spam.
- The "X-Originating-IP:" immediately below was added by '' to identify the source IP address.

But to make it simple, just paste the header chunk into this link and it will tell you more in organised fashion
JohnBusiness Consultant (Owner)Commented:
It is an exceedingly common spam trick to forge the from so as to be from the sender. I see this all the time in my spam quarantine.

So long as your mail server is not a open relay, and so long as your email clients have not been compromised with malware, then really all you can do is check your spam filtering rules and try to exclude spam based on its characteristics (more of an art than a science). ... Thinkpads_User
eikeleinAuthor Commented:
Thank you thinkpads_user.
I am sorry but I knew all this; I am just trying to help a customer to maybe stop what he perceives almost as a personal assault.
But again, thanks.
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

JohnConnect With a Mentor Business Consultant (Owner)Commented:
By the way, you can use Smart Whois or like tool to trace IP addresses. is Yahoo! is a more likely candidate. It is registered to Kuentos Communications, Inc. in Guam.

.. Thinkpads_User
JohnBusiness Consultant (Owner)Commented:
My email is by now very well filtered and I see very little spam. Accordingly, I do not trace much spam any more. However, a decent approach (and one you can use here I think) is to look at the IP farthest down. In many cases, this is where the spam is coming from. ... Thinkpads_User
Dave BaldwinConnect With a Mentor Fixer of ProblemsCommented:
It looks to me like someone has guessed his Yahoo password and now has access to his account and they are sending spam out as though it were him.  Has his password been changed yet?
eikeleinAuthor Commented:
@thinkpads_user: Thanks for the comment with the translated IP addresses; that certainly may become helpful. And the tip with the IP furthest down, THAT is the kind of tips I was hoping for.

@DaveBaldwin: THANK YOU Dave.  I am biting my hinders that I didn't think of that... You are a contender for at least some of the points.
eikeleinAuthor Commented:
Wow breadtan! Thank you! That was the kind of info I was looking for.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.