This site appears to be run by the authors to host their malware. It's
been around for a long time now. I track it on and off to see if they
add any new exploits. Since it's inception they have refined the code
and exploits. I've been looking at it for about 8 months on and off
but I think it's been around a lot longer. Google searches reveals
very little info. There are about 16 or so exploits up on the site at
the moment. Windows media player, quicktime, IE, etc.... I've not
looked at all the latest pages yet so I'm not sure which are new or
not. Discovery after 4 months for this exe is good but there are still
some AV that don't detect it.

hxxp://www.ahack.info
hxxp://www.ahack.info/tds/
hxxp://www.ahack.info/forum/index.php
hxxp://www.ahack.info/ice/exploits/
hxxp://www.ahack.info/ice/index.php/exploits/
http://www.ahack.info/ice/exe.php < exe

I thought it interesting that there was so little on this domain yet
it has been up for such a period of time. It is blacklisted by some
RBLs though but that may be due other sites hosted on the IP.

http://www.robtex.com/rbl/203.202.239.59.html

/dean

On Fri, Aug 29, 2008 at 11:35 AM, Brack o'Malley <[EMAIL PROTECTED]> wrote:
> Found this IRC based C&C (yesterday) if anybody wants to go after it.  The
> channel was
> still live as of yesterday morning. it gets delivered as a self extracting
> rar file.
>
> [mirc]
> user=Kj6cQa9hFw3tR
> nick=Qd0pAb4xTi3a
> anick=Gg8lNv5rCk7lW
> email=Politia
> host=serveru de ircdSERVER:serveru de ircd:6667GROUP:servere
>
>
>
> Here's the usual server.ini:
> [servers]
> n1=serveru de ircdSERVER:red.box23.de:6667GROUP:servere
> n2=serveru de ircdSERVER:red.box23.de:9999GROUP:servere
> n4=bucharest.ro.eu.undernet.orgSERVER:bucharest.ro.eu.undernet.org:6667GROUP:serveree
> n5=Helsinki.FI.EU.Undernet.orgSERVER:Helsinki.FI.EU.Undernet.orgg:6667GROUP:serveree
> n6=Ede.NL.EU.UnderNet.OrgSERVER:Ede.NL.EU.UnderNet.Org:6667GROUP:serveree
> n7=graz.at.Eu.UnderNet.orgSERVER:217.168.95.245:6667GROUP:serveree
> n8=Helsinki.FI.EU.Undernet.orgSERVER:Helsinki.FI.EU.Undernet.org:6667GROUP:serveree
> n9=London.UK.Eu.UnderNet.orgSERVER:38.114.116.5:6667GROUP:serveree
> n10=London2.UK.EU.Undernet.OrgSERVER:London2.UK.EU.Undernet.Org:6667GROUP:serveree
> n11=Oslo1.NO.EU.undernet.orgSERVER:Oslo1.NO.EU.undernet.org:6667GROUP:serveree
> n12=Oslo2.NO.EU.undernet.orgSERVER:Oslo2.NO.EU.undernet.org:6667GROUP:serveree
> n13=mesa2.az.us.undernet.org:mesa2.az.us.undernet.org:6667GROUP:serveree
> n14=mesa.az.us.undernet.orgSERVER:mesa.az.us.undernet.org:6667GROUP:serveree
> n15=US.Undernet.orgSERVER:66.186.59.50:6667GROUP:serveree
> n16=Diemen.NL.EU.Undernet.OrgSERVER:Diemen.NL.EU.Undernet.Org:6667GROUP:serveree
> n17=eu.Undernet.OrgSERVER:208.83.20.130:6667GROUP:serveree
> n122=Lelystad.NL.EU.UnderNet.OrgSERVER:Lelystad.NL.EU.UnderNet.Org:6667GROUP:serveree
> n121=SantaAna.CA.US.Undernet.orgSERVER:72.51.18.254:6667GROUP:serveree
> n212=Zagreb.Hr.EU.UnderNet.orgSERVER:193.109.122.67:6667GROUP:serveree
> n323=Tampa.FL.US.Undernet.orgSERVER:Tampa.FL.US.Undernet.org:6667GROUP:serveree
> n419=EU, AT,
> DiemenSERVER:Diemen.NL.EU.Undernet.Org:6660-6670,7000GROUP:serveree
> n420=EU, AT,
> ElseneSERVER:Elsene.Be.Eu.undernet.org:6660-6670,7000GROUP:serveree
> n421=EU, AT, GrazSERVER:195.68.221.221:6660-6670,7000GROUP:serveree
> n422=EU, AT, Graz2SERVER:64.18.128.86:6660-6670,7000GROUP:serveree
> n423=EU, AT, GrazSERVER:195.197.175.21:6660-6670,7000GROUP:serveree
> n424=EU, BE, ElseneSERVER:195.144.12.5:6667-6669,7000GROUP:serveree
> n425=EU, HR, ZagrebSERVER:161.53.178.240:6666-6669,9999GROUP:serveree
> n426=EU, NL, AmsterdamSERVER:195.47.220.2:6667GROUP:serveree
> n427=EU, NL, EdeSERVER:193.109.122.67:6666-6669GROUP:serveree
> n428=EU, NO, OsloSERVER:69.16.172.40:6666-6669GROUP:serveree
> n429=US, AZ, MesaSERVER:194.109.20.90:6660,6665-6667,7000GROUP:serveree
> n430=Random EU serverSERVER:eu.undernet.org:6667GROUP:serveree
> n431=Random US serverSERVER:mesa2.az.us.undernet.org:6667GROUP:serveree
> _______________________________________________
> botnets@, the public's dumping ground for maliciousness
> All list and server information are public and available to law enforcement
> upon request.
> http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
>
>
_______________________________________________
botnets@, the public's dumping ground for maliciousness
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to