0 Members and 1 Guest are viewing this topic.
http://chezswing.com/jr/prop5.jpg
hxxp://buidnote.com/nates/?h=9ag0?892bd46e0100f07002da639a9a060000000002c15031930001040900000000170FYI Referrer was : http://ads.svx.adbrite.com/adserver/display_iab_ads.php?
hxxp://79.117.131.32/pid=12100/type=videxp/setup.exeReferrer = http://easter-egg-design-funny.diwyze.net/
hxxp://www.sftcp.cn/qy.exesame file different namehxxp://www.sftcp.cn/tt.exe
$ dig www.sftcp.cn +shortqqaa.9966.org. <-- gee that look's familiar121.14.154.4
Code: [Select]hxxp://79.117.131.32/pid=12100/type=videxp/setup.exeReferrer = http://easter-egg-design-funny.diwyze.net/
easter-egg-design-funny.diwyze.net/scripts.js
zodune.info/search.php?q=easter+egg+design+funny
inetsecuritycenter.com/index.php?c=0&e=0&affid=08064
Quote from: Mr Clean on April 06, 2009, 06:12:13 pmCode: [Select]hxxp://79.117.131.32/pid=12100/type=videxp/setup.exeReferrer = http://easter-egg-design-funny.diwyze.net/There are more easter eggs.When I look at Code: [Select]easter-egg-design-funny.diwyze.net/scripts.jsthere is an obfuscated iframe toCode: [Select]zodune.info/search.php?q=easter+egg+design+funnyredirects to Code: [Select]inetsecuritycenter.com/index.php?c=0&e=0&affid=08064
$ dig inetsecuritycenter.com +short209.44.126.14 <--- has been on my naught list for quite some time now
Quote from: SysAdMini on April 06, 2009, 07:15:32 pmQuote from: Mr Clean on April 06, 2009, 06:12:13 pmCode: [Select]hxxp://79.117.131.32/pid=12100/type=videxp/setup.exeReferrer = http://easter-egg-design-funny.diwyze.net/There are more easter eggs.When I look at Code: [Select]easter-egg-design-funny.diwyze.net/scripts.jsthere is an obfuscated iframe toCode: [Select]zodune.info/search.php?q=easter+egg+design+funnyredirects to Code: [Select]inetsecuritycenter.com/index.php?c=0&e=0&affid=08064Code: [Select]$ dig inetsecuritycenter.com +short209.44.126.14 <--- has been on my naught list for quite some time nowhttp://www.malwaredomainlist.com/mdl.php?search=209.44.126&colsearch=All&quantity=50
http://79.117.131.32/pid=12100/type=videxp/spl/pdf.pdf
http://www.yutergfrg.cn/1.exe
http://www.asdfgsdfgsdf.cn/0330.exe
http://www.arhjfgjdrf.cn/new.txtcontains:open=yurl1= http://www.yutergfrg.cn/1.exeurl2= http://www.yutergfrg.cn/2.exeurl3= http://www.yutergfrg.cn/3.exeurl4= http://www.yutergfrg.cn/4.exeurl5= http://www.yutergfrg.cn/5.exeurl6= http://www.yutergfrg.cn/6.exeurl7= http://www.yutergfrg.cn/7.exeurl8= http://www.yutergfrg.cn/8.exeurl9= http://www.yutergfrg.cn/9.exeurl10= http://www.yutergfrg.cn/10.exeurl11= http://www.yutergfrg.cn/11.exeurl12= http://www.yutergfrg.cn/12.exeurl13= http://www.yutergfrg.cn/13.exeurl14= http://www.yutergfrg.cn/14.exeurl15= http://www.yutergfrg.cn/15.exeurl16= http://www.yutergfrg.cn/16.exeurl17= http://www.yutergfrg.cn/17.exeurl18= http://www.yutergfrg.cn/18.exeurl19= http://www.yutergfrg.cn/19.exeurl20= http://www.yutergfrg.cn/20.exeurl21= http://www.yutergfrg.cn/21.exeurl22= http://www.yutergfrg.cn/22.exeurl23= http://www.yutergfrg.cn/23.exeurl24= http://www.yutergfrg.cn/24.exeurl25= http://www.yutergfrg.cn/25.exeurl26= http://www.yutergfrg.cn/26.exeurl27= http://www.yutergfrg.cn/27.exeurl28= http://www.yutergfrg.cn/28.exeurl29= http://www.yutergfrg.cn/29.exeurl30= http://www.yutergfrg.cn/30.exeurl31= http://www.yutergfrg.cn/31.exeurl32= http://www.yutergfrg.cn/32.exeurl33= http://www.yutergfrg.cn/33.exeurl34= http://www.yutergfrg.cn/34.exeurl35= http://www.yutergfrg.cn/35.exe
$ dig www.asdfgsdfgsdf.cn +short222.186.25.35$ dig www.yutergfrg.cn +short222.186.25.35$ dig www.arhjfgjdrf.cn +short222.186.25.35$ dig www.yutergfrg.cn +short222.186.25.35
hxxp://dsafsa.daslxzcewralrocjn.cn/9.exe$ dig dsafsa.daslxzcewralrocjn.cn +short222.76.210.14
http://www.999mimi.net/QvodSetup3.exe$ dig www.999mimi.net +short208.98.13.131
http://www.991uu.net/97fbq.exe$ dig www.991uu.net +short208.98.4.100
Code:hxxp://dsafsa.daslxzcewralrocjn.cn/9.exe$ dig dsafsa.daslxzcewralrocjn.cn +short222.76.210.14http://www.virustotal.com/analisis/460816a185773ade10a3bb04645f2c3f
9.buzhidaoganshenmeyong.cn/bGetIp.aspx -> GET9.buzhidaoganshenmeyong.cn/BaiduClickerClient.asmx -> POST
ction=result&task_id=12c7b74b4f8f197e4618d48d794c1802a&format=htmlQuote9.buzhidaoganshenmeyong.cn/bGetIp.aspx -> GET9.buzhidaoganshenmeyong.cn/BaiduClickerClient.asmx -> POST
9.buzhidaoganshenmeyong.cn/BaiduClickerClient.asmx
http://fullandtotalsecurity.com/js/jquery.jshttp://fullandtotalsecurity.com/js/jquery-init.jshttp://fullandtotalsecurity.com/images/alert.gifhttp://fullandtotalsecurity.com/js/flist.jshttp://fullandtotalsecurity.com/images/page_progressbar.gifhttp://fullandtotalsecurity.com/images/i5000000.gifhttp://fullandtotalsecurity.com/images/i1000000.gifhttp://fullandtotalsecurity.com/images/i7000000.gifhttp://fullandtotalsecurity.com/images/hdd.gifhttp://fullandtotalsecurity.com/images/inf20000.gifhttp://fullandtotalsecurity.com/images/i3000000.gifhttp://fullandtotalsecurity.com/images/i4000000.gifhttp://fullandtotalsecurity.com/images/qicon.gifhttp://fullandtotalsecurity.com/images/window1.gifhttp://fullandtotalsecurity.com/images/box_top_.gifhttp://fullandtotalsecurity.com/images/progressbar.gifhttp://fullandtotalsecurity.com/images/progressbar_green.gifhttp://fullandtotalsecurity.com/images/hrline.gifhttp://fullandtotalsecurity.com/images/i6000000.gifhttp://fullandtotalsecurity.com/images/folder.gifthis one downloads the goodiehttp://fullandtotalsecurity.com/download.php?affid=08043$ dig fullandtotalsecurity.com +short209.44.126.14
http://fullandtotalsecurity.com/install/ws.zip$ unzip ws.zip Archive: ws.zip inflating: av.exe inflating: av.glu
lot's of familiar family membershttp://www.bfk.de/bfk_dnslogger.html?query=209.44.126.14