A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #26491  by R136a1
 Mon Aug 10, 2015 4:35 pm
List of extracted domain names:
Code: Select all
www.divextreme-ar.com
www.crazy-jump.com
www.dive-extreme.com
www.tandemskydive-ar.com
www.groupdive.com
www.skydivelessons.com
www.bungee4you-br.com
www.brazil-crazybungee.com
www.bungeejumping-br.com
www.groupbungee-br.com

www.divextreme-au.com
www.crazyjump-uy.com
www.stuntjumps.com
www.tandemskydive-au.com
www.groupdive-au.com
www.au-skydivelessons.com
www.bungee4you-uy.com
www.uruguay-crazybungee.com
www.bungeejumping-uy.com
www.groupbungee-uy.com

www.circlesofourlives-ir.com
www.clickflowers-hk.com
www.cropcirclestours.com
www.irelancropcircles.com
www.ir-cool.com
www.magnificentcircles.com
www.china-flowershop.com
www.hongkong-bouquets.com
www.beautifuldaisies.com
www.rosesinchina.com
Last block explains why Kaspersky calls this malware "Flowershop". If you hurry up you can set up some sinkholes...
 #26541  by dhuss
 Mon Aug 17, 2015 9:06 pm
Some more domains in the attached sample
Code: Select all
www.holidayapartments4you.com
www.euro-rafting.com
www.holidayapartments-Paris.com
www.paris-holidayapartments.com
www.franceholidayapartments.com
www.apartmentsin-paris.com
www.raftingholiday.com
www.eurorafting-tr.com
www.turkeyextremerafting.com
www.raftingtours-turkey.com
Attachments
pwd: infected
(66.92 KiB) Downloaded 47 times