Great, thanks for sharing. I noticed a pattern in the download schema for the exploits/binaries.
eleonorepack2.cn/myexp/pdf.php?spl=pdf_ie2\
eleonorepack2.cn/myexp/index.php?spl=4\
eleonorepack2.cn/myexp/pdf.php?spl=pdf_ie2
eleonorepack2.cn/myexp/index.php?spl=2
eleonorepack2.cn/myexp/index.php?spl=3
eleonorepack2.cn/myexp/index.php?spl=4
eleonorepack2.cn/myexp/index.php?spl=5
eleonorepack2.cn/myexp/getexe.php?spl=IE_DownExec
eleonorepack2.cn/myexp/getexe.php?spl=DirectX_DS
eleonorepack2.cn/myexp/getexe.php?spl=MS09-002
eleonorepack2.cn/myexp/getexe.php?spl=Spreadsheet
pupok789.co.cc/eleon/getexe.php?spl=mdac
I made a quick and dirty snort sig if anyone wants to use it. I will be testing it out for false-positives and let u guys know how it works out. Feel free to add to it and modify it.
********
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Possible Eleonore Exploit pack - Generic download"; flow:established,to_server;pcre:"/GET\s\/.*\.php\?spl\=.*/i"; classtype:trojan-activity; sid:9000095; rev:1; reference:url,www.malwaredomainlist.com/forums/index.php?topic=3354.0;)
*******