To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
Courtesy of nepenthes & Norman's sandbox:

nepenthes-d8bc3bf7bd04b09bc2c791fa2a32a443-dcz.exe : [SANDBOX]
contains a security risk - W32/Spybot.gen6 (Signature: W32/Spybot.XAY)
 [ General information ]
   * **IMPORTANT: PLEASE SEND THE SCANNED FILE TO: [EMAIL PROTECTED]
- REMEMBER TO ENCRYPT IT (E.G. ZIP WITH PASSWORD)**.
   * Decompressing Mew.
   * **Locates window "NULL [class mIRC]" on desktop.
   * File length:        97992 bytes.
   * MD5 hash: d8bc3bf7bd04b09bc2c791fa2a32a443.

 [ Changes to filesystem ]
   * Creates file C:\WINDOWS\SYSTEM32\dcz.exe.
   * Deletes file 1.

 [ Changes to registry ]
   * Creates value "Windows Automatical Updater"="dcz.exe" in key
"HKLM\Software\Microsoft\Windows\CurrentVersion\Run".
   * Creates value "Windows Automatical Updater"="dcz.exe" in key
"HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices".
   * Creates value "Windows Automatical Updater"="dcz.exe" in key
"HKCU\Software\Microsoft\Windows\CurrentVersion\Run".

 [ Network services ]
   * Looks for an Internet connection.
   * Connects to "bla.hackn.us" on port 65267 (TCP).
   * Connects to IRC Server.
   * IRC: Uses nickname |803400.
   * IRC: Uses username htpserld.
   * IRC: Joins channel #dcz with password r00t3d.
   * IRC: Sets the usermode for user |803400 to +n+B.

 [ Security issues ]
   * Possible backdoor functionality [Authenticate] port 113.

 [ Process/window information ]
   * Creates a mutex dczn3t.
   * Will automatically restart after boot (I'll be back...).

 [ Signature Scanning ]
   * C:\WINDOWS\SYSTEM32\dcz.exe (97992 bytes) : W32/Spybot.XAY.


(C) 2004-2006 Norman ASA. All Rights Reserved.

The material presented is distributed by Norman ASA as an information
source only.
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to