[nsp-sec] irc bot controller on as 10929 as3356, 4436, 5769, 6453, 14572
Marc Kneppers
Marc.Kneppers at TELUS.COM
Mon Feb 23 17:00:55 EST 2009
Hi
Just a quick note, since I don't think Videotron is online. I've been in contact with them (Videotron) about this. Their abuse desk will be attempting to contact them shortly so we may get some traction.
Thx
-
MArc
TELUS
852
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> Smith, Donald
> Sent: Monday, February 23, 2009 11:35 AM
> To: 'nsp-security NSP'
> Subject: [nsp-sec] irc bot controller on as 10929 as3356,
> 4436, 5769, 6453, 14572
>
> ----------- nsp-security Confidential --------
>
> This has been around for a while. Attempts to notify
> netelligent appears to be going to the bit bucket.
> Could leven3, nlayer, videotron or globeinternet put a little
> pressure on them to shutdown the bot controller identified below?
> Thanks.
>
>
> $ whois -h whois.cymru.com 209.44.119.210
> AS | IP | AS Name
> 10929 | 209.44.119.210 | NETELLIGENT - Netelligent
> Hosting Services Inc.
>
> $ whois -h whois.cymru.com 209.44.97.57
> AS | IP | AS Name
> 10929 | 209.44.97.57 | NETELLIGENT - Netelligent
> Hosting Services Inc.
>
> $ whois -h whois.cymru.com 209.44.119.210
> AS | IP | AS Name
> 10929 | 209.44.119.210 | NETELLIGENT - Netelligent
> Hosting Services Inc.
>
>
> $ whois -h upstream-whois.cymru.com 209.44.119.210
> PEER_AS | IP | AS Name
> 3356 | 209.44.119.210 | LEVEL3 Level 3 Communications
> 4436 | 209.44.119.210 | AS-NLAYER - nLayer Communications, Inc.
> 5769 | 209.44.119.210 | VIDEOTRON - Videotron Telecom Ltee
> 6453 | 209.44.119.210 | GLOBEINTERNET TATA Communications
>
>
> >> The C&C is contacted via dns lookup as follows. It runs a
> fairly standard
> >> IRC based C&C on 80/tcp.
> >>
> >> $ host www.baldmanpower.net
> >> www.baldmanpower.net has address 209.44.97.57
> >> www.baldmanpower.net has address 209.44.118.105
> >> www.baldmanpower.net has address 209.44.119.210
>
>
> The exe is located here.
> In as 14572 (suavemente) space.
> >> http://66.11.114.38/~gamegone/test.exe
>
>
> Virustotal results here:
> http://www.virustotal.com/analisis/0750f7289e20ef62b171f4d1efd2f0c6
>
> Some engines identify it as sdbot others as rbot.
>
>
>
>
> H8Hz
> Donald.Smith at qwest.com gcia
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security
> community. Confidentiality is essential for effective
> Internet security counter-measures.
> _______________________________________________
>
More information about the nsp-security
mailing list