Author: Pig

89.17.220.220(banker hosted in Spain Barcelona Miarroba Networks S.l)

Uncategorized

The method here is this: the spanish or brasilian hecker uses java aplet to download and execute his banker into remote computers the malicious url file is this: http://pics24.fileave.com/ to find out how the banker is downloaded and excuted u have to download the index.html file via wget for windows http://users.ugent.be/~bpuype/wget/#usage after downloading the index.htmlRead more...

46.21.169.42(irc botnet hosted in Netherlands Amsterdam Denkers Ict – Ipv4 Infrastructure)

Uncategorized

Remote Host Port Number 46.21.169.42 6567 PASS s1m0n3t4 70.38.98.239 80 * The data identified by the following URL was then requested from the remote web server: o http://img105.herosh.com/2011/05/13/348778130.gif MODE [SI|USA|00|P|75060] -ix JOIN #mot# c1rc0dusoleil PRIVMSG #mot# :[Dl]: File download: 80.0KB to: c:WINDOWSjds.exe @ 80.0KB/sec. PRIVMSG #mot# :[Dl]: Created process: “c:WINDOWSjds.exe”, PID: PONG Apple.Network NICK [SI|USA|00|P|75060]Read more...

mecanto571.dyndns.org(irc botnet hosted in Germany Hetzner Online Ag)

Uncategorized

Resolved : [mecanto571.dyndns.org] To [178.63.252.56] Remote Host Port Number 178.63.252.56 26745 PASS google_cache2.tmp or PASS serverpass 64.186.152.219 26745 PASS google_cache2.tmp or PASS serverpass 64.62.181.43 80 Invisible Users: 1417 Channels: 1 channels formed Clients:I have 1418 clients and 0 servers Local users: Current Local Users: 1418 Max: 4139 Global users: Current Global Users: 1418 Max: 1677Read more...