xixbh.net (ngrbot irc botnet hosted by oneandone.net)

Resolved xixbh.net to,, Server:  xixbh.net (alternate domains: xixbh.com gigasbh.org) Port:  1863 Server password:  jobs Channel:  #jobs Topic for #jobs is: !dl hxxp://hotfile.com/dl/200451226/2ff4c3f/orf4Duu.html Topic for #jobs set by x at Fri Mar 29 13:40:52 2013 SSL is required to connect to this server This is the same guy as these previous posts.

dictionarysrnifty.no-ip.org (Athena irc botnet hosted by infiumhost.com)

Resolved dictionarysrnifty.no-ip.org to Server:  dictionarysrnifty.no-ip.org Port:  9001 * I have 83 clients and 0 servers * 83 451 :Current local users 83, max 451 Channel:  #alpha Topic for #alpha is: !botkill.start Topic for #alpha set by LK at Fri Mar 29 10:30:08 2013 All users are also joined to the channel #lobby on connection.

truboot.org (Athena http botnet hosted by edenhost.com)

Resolved truboot.org to Server:  truboot.org Gate file:  /at/gate.php This is the http version of the athena irc bot, which has graced this blog many times. Login page located at truboot.org/at/login/index.php Hosting infos: http://whois.domaintools.com/ (Page view botnet hosted by incero.com)

Server: Url locations:  /Programs/links/Maki/, /Programs/links/Angelo/ The malware opens all the pages in each folder, and visits any urls that are contained in them. Current urls: <meta HTTP-EQUIV=”REFRESH” content=”0; url=http://minecraftadminhack.blogspot.com/”> <meta HTTP-EQUIV=”REFRESH” content=”0; url=http://tf2itemsgenerator.blogspot.com/”> <meta HTTP-EQUIV=”REFRESH” content=”0; url=http://www.youtube.com/watch?v=UUTZW2AjhFI”> <meta HTTP-EQUIV=”REFRESH” content=”0; url=http://minecraftadminhack.blogspot.com”> <meta HTTP-EQUIV=”REFRESH” content=”0; url=http://youtu.be/AhPTX1n_8p8″> <meta HTTP-EQUIV=”REFRESH” content=”0; url=http://f65a1cad.yyv.co”> <meta HTTP-EQUIV=”REFRESH” content=”0; url=http://14b3e31e.linkbucks.com”> <META

irc.benjol.tk(Linux bots hosted in France Roubaix Ovh Systems)

Resolved : [irc.benjol.tk] To []Resolved : [irc.benjol.tk] To [] GIF89a ? ????ÿÿÿ!ù ????,???? ? ?? D ?;?<? /* * * NOGROD. since 2008 * IRC.UDPLINK.NET * * COMMANDS: * * .user <password> //login to the bot * .logout //logout of the bot * .die //kill the bot * .restart //restart the bot * .mail <to>

img14.poco.cn(HTTP Banking trojan hosted in China Shanghai Chinanet Shanghai Province Network)

Resolved : [img14.poco.cn] To [] Resolved : [img14.poco.cn] To [] Resolved : [img14.poco.cn] To [] Resolved : [img14.poco.cn] To [] Resolved : [img14.poco.cn] To [] Resolved : [img14.poco.cn] To [] Samples: hxxp://www.ccfyi.com/notepad.exe hxxp://www.ccfyi.com/mstsc.exe hxxp://www.ccfyi.com/cc.tx timg14.poco.cn GET /mypoco/myphoto/20130323/19/874940020130323195257040.jpg hxxp:// 1.txt: keb.co.kr keb.co.kr www.keb.co.kr www.keb.co.kr citibank.co.kr citibank.co.kr www.citibank.co.kr www.citibank.co.kr

turnaroundhot.info (Betabot http botnet hosted by dataclub.biz)

Resolved turnaroundhot.info to Server:  turnaroundhot.info Gate file:  /hot/order.php Alternate domains:  fivestarintack.ws/live/order.php, tstartedtoearly.info/hot/order.php The owner seems to be using it to direct views towards www.twitch.tv/bowserdubs, where an Estonian-American is currently streaming Runescape. Hosting infos: http://whois.domaintools.com/