What I suspect is that the ones behind this got access to some corporate e-mail accounts (e.g. phishing) and are collecting inquiry and sample request e-mails like this to make the Malware containing e-mails look more legitimate looking.
For example, in the above e-mail, I reckon this was an actual e-mail some company received, but with the lines “Dear Sir/Ma” and “I need to know if you have this product in this attached picture?..” added, as these are the only two I notice typos in. The footer contact details appear to be made up, which I checked before posting the above.
The other thing I found interesting is that a Google search on a few phrases did not turn up anything, so they are using fresh content in their scams, at least this one anyway. With just about every other scam e-mail I received, I would get lots of similar samples published if I search for a random phrase in the e-mail.
The Zip attachment was also one of the largest I’ve seen in such an e-mail at roughly 800KB from what I recall, probably because it has the full Malware package in the attachment. Most infected attachments usually contain an executable file of between 10KB and 20KB, which download the Malware when launched. Then again, this is probably done to avoid the risk of a Firewall blocking the download of the full Malware package with the tiny download-dropper infections.