Month: July 2011

ha3.ha2.ha1.us(irc botnet hosted in Canada Globotech Communications)

Uncategorized

IRC Botnet Host Malware: vnc.exe MD5: 0x962B127F456B05956DE254B0C68A767F IP: 72.10.160.166 / Host: ha3.ha2.ha1.us Location : CA, Canada NICK [00|USA|XP|SP2]-4374 USER yebse 0 0 :[00|USA|XP|SP2]-4374 JOIN #vnc USERHOST [00|USA|XP|SP2]-4374 MODE [00|USA|XP|SP2]-4374 +x Now talking in #vnc Topic On: [ #vnc ] [ Scanner VNC: ONline Link: http://www.fandefutebol.com.br/torcedores/vnc.exe] Topic By: [ Nogrod ] Modes On: [ #vnc ]Read more...

FastAntivirus2011 fake av

Uncategorized

This is another sample from fake av used to infectd people asking them to download this antivirus wich is fake Sample was discovered by John Download link : http://www.multiupload.com/IGCWAUGNJR serial number: 2233-298080-3424(credits to xylitol for cracking it) Loader example by Xylitol: http://pastebin.com/qCxepgrp

Trojan-Downloader.Win32.Banload(malware hosted in India Delhi Lala_madhoram_bhagwan_dass_chritable_society)

Uncategorized

– DNS Queries: envc.machcar.kr DNS_TYPE_A 222.24.94.15 vhosts.packmanbd.com DNS_TYPE_A 222.24.94.19 222.24.94.19 – HTTP Conversations: 222.24.94.15:80 – [envc.machcar.kr] Request: POST /envc.php Response: 200 “OK” 222.24.94.19:80 – [vhosts.packmanbd.com] Request: GET /manual/vhosts.txt Response: 200 “OK” Url used to infect people: http://pedofilia.warbe.org/id/noticias/g1.globo.com/pedofilia/2011/0-19384pastor-e-filmado-fazendo-sexo-oral-com-adolescente.php?0.82545 Direct download: http://pedofilia.warbe.org/id/noticias/g1.globo.com/pedofilia/2011/videos-pedofilia-1039-pastor-fazendo-sexo-oral-com-adolescente-AVI.exe Hosting infos: http://whois.domaintools.com/122.160.131.225

area.myarena.ru(Destination Darkness Outcast System & Optima)

Uncategorized

HTTP Malware from Russia used to ddos Admin Panel: http://area.myarena.ru/ex/adm/auth.php – DNS Queries: area.myarena.ru DNS_TYPE_A 62.122.213.10 http://palmary73.net DNS_TYPE_A – HTTP Conversations: 62.122.213.10:80 – [area.myarena.ru] Request: GET /ex/?uid=035409&ver=9aXPA Response: 200 “OK” Request: GET /ex/adm/?uid=035409&ver=9aXPA Response: 302 “Found” Request: GET /ex/adm/auth.php Response: 200 “OK” Request: GET /ex/adm/index.php?uid=035409&ver=9aXPA Response: 302 “Found” Request: GET /ex/adm/auth.php Response: 200 “OK” ExeRead more...