To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
This botnet is interesting to me because the owner knows something about the 
COX ISP's security system. COX has an ircd system in place to catch drones. 
The service they use is called Marvin.

The trojan came to us via a honeypot operating inthe NZ area:

Report on cox-securitymarvin.exe -
********************************************
MD5:          f766e46e42bf32d58ea28062f262249e
AntiVir:      Worm/RBot.328262
Avast!:       Win32:Trojano-3428 [Trj]
AVG:          No Virus Found
BitDefender:  Backdoor.RBot.0E463EAA
ClamAV:       Exploit.DCOM.Gen
F-Prot:       W32 Ircbot1.gen

SERVER: 205.209.156.33
PORT: 6667
NICK: Cox-Security-|-123456
USER CONNECT STRING:   USER apbkay 0 0 :Cox-Security-|-123456 
Bot Population: 63
Channel: ##cox## 
Chan Key: rofl
Topic: .root.mass -s
Operator: opwirpwoeipweior


The bot was poorly spread, as it doesn't use any packing or obscuring 
techniques, its quickly picked up by all the virus scanners and strings 
output will display useful information.
-- 
Nicholas Albright
Founder of Shadowserver.org
http://www.shadowserver.org



Attachment: pgpj8pmVF6VnZ.pgp
Description: PGP signature

_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to