oki.nerashti.net(Burimi bad hecker)

Remote Host Port Number
77.68.56.80 81

addr: oki.nerashti.net ip: 77.68.56.80
addr: oki.nerashti.net ip: 88.208.209.166

Domain from this criminal lamer is hosted in australia and is strange how they allow botnet use from domains registered on :https://www.melbourneit.com.au/

Here infos about australian hosting:
Sales
Australian callers: 1300 654 677
Other callers: +61 3 8624 2300
Support
Australian callers: 1300 654 677
Other callers: +61 3 8624 2300
Australia | Melbourne | Head Office
Street Address

Level 2, 120 King Street
Melbourne Victoria 3000
Australia
Office Hours

24 hours a day – 7 days a week
Affiliate Support
Australian callers: 1300 360 875
Other callers: +61 3 8624 2300
Fax: +61 3 9620 2388

these guys host 30k botnet conected to nerashti.net

NICK n|USA|XP|COMPUTERNAME|fgfbdpb
USER n “” “lol” :n
JOIN #bul#
PONG 422
PONG :request1.not.found

Now talking in #bul#
(rdp) .im /99/106/112/81/55/59/40/125/111/122/35/103/121/122/118/96/115/106/44/126/39/116/100/75/12/110/118/127/125/126/116/107/103/102/47/80/105/115/54/31/74/72/76/82/67/36/48/59/37/38/89/84/99/

Registry Modifications

* The newly created Registry Value is:
o [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun]
+ MSNUpdateServices = “%AppData%S-3685-5437-5687winsrvn.exe”

so that winsrvn.exe runs every time Windows starts

File System Modifications

* The following files were created in the system:

# Filename(s) File Size File Hash
1 %AppData%S-3685-5437-5687winsrvn.exe
[file and pathname of the sample #1] 217 088 bytes MD5: 0x98F921C44AE7B688A5DD49A97282904B
SHA-1: 0xB0766C9C8A29E606C7357784207758F8A905A057
2 %AppData%wimknrncds.txt 0 bytes MD5: 0xD41D8CD98F00B204E9800998ECF8427E
SHA-1: 0xDA39A3EE5E6B4B0D3255BFEF95601890AFD80709

Categories: Uncategorized
Previous post
Next post