To report a botnet PRIVATELY please email: [EMAIL PROTECTED] ---------- Courtesy of nepenthes & Norman's sandbox:
nepenthes-d8bc3bf7bd04b09bc2c791fa2a32a443-dcz.exe : [SANDBOX] contains a security risk - W32/Spybot.gen6 (Signature: W32/Spybot.XAY) [ General information ] * **IMPORTANT: PLEASE SEND THE SCANNED FILE TO: [EMAIL PROTECTED] - REMEMBER TO ENCRYPT IT (E.G. ZIP WITH PASSWORD)**. * Decompressing Mew. * **Locates window "NULL [class mIRC]" on desktop. * File length: 97992 bytes. * MD5 hash: d8bc3bf7bd04b09bc2c791fa2a32a443. [ Changes to filesystem ] * Creates file C:\WINDOWS\SYSTEM32\dcz.exe. * Deletes file 1. [ Changes to registry ] * Creates value "Windows Automatical Updater"="dcz.exe" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Run". * Creates value "Windows Automatical Updater"="dcz.exe" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices". * Creates value "Windows Automatical Updater"="dcz.exe" in key "HKCU\Software\Microsoft\Windows\CurrentVersion\Run". [ Network services ] * Looks for an Internet connection. * Connects to "bla.hackn.us" on port 65267 (TCP). * Connects to IRC Server. * IRC: Uses nickname |803400. * IRC: Uses username htpserld. * IRC: Joins channel #dcz with password r00t3d. * IRC: Sets the usermode for user |803400 to +n+B. [ Security issues ] * Possible backdoor functionality [Authenticate] port 113. [ Process/window information ] * Creates a mutex dczn3t. * Will automatically restart after boot (I'll be back...). [ Signature Scanning ] * C:\WINDOWS\SYSTEM32\dcz.exe (97992 bytes) : W32/Spybot.XAY. (C) 2004-2006 Norman ASA. All Rights Reserved. The material presented is distributed by Norman ASA as an information source only. _______________________________________________ To report a botnet PRIVATELY please email: [EMAIL PROTECTED] All list and server information are public and available to law enforcement upon request. http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
