5 samples:
73ff24994746a90644c6961650c920b8fd502b2c
b8ccba69e0e7693661c789d4199a507550f94a2f
a7a7a22d778745bd7063e76aea185a7f4c156622
b2eeda85c8da204b349247ded3e152bc45cddcd6
182188d63eeab56ab390a1f80c218f8c5760ee58
p4r4n0id
A forum for reverse engineering, OS internals and malware analysis
p4r4n0id wrote:5 samples:FYI - malwr.com shows that these samples all talk to same C&C
73ff24994746a90644c6961650c920b8fd502b2c
b8ccba69e0e7693661c789d4199a507550f94a2f
a7a7a22d778745bd7063e76aea185a7f4c156622
b2eeda85c8da204b349247ded3e152bc45cddcd6
182188d63eeab56ab390a1f80c218f8c5760ee58
p4r4n0id
forty-six wrote:& C2 = down :cry:what do you mean down?
Starting Nmap 5.21 ( http://nmap.org ) at 2013-10-04 10:33 EDT
Initiating SYN Stealth Scan at 10:33
Scanning 208.91.197.54 [100 ports]
Discovered open port 53/tcp on 208.91.197.54
Discovered open port 80/tcp on 208.91.197.54
Completed SYN Stealth Scan at 10:33, 5.23s elapsed (100 total ports)
Nmap scan report for 208.91.197.54
Host is up (0.087s latency).
Scanned at 2013-10-04 10:33:54 EDT for 5s
Not shown: 98 filtered ports
PORT STATE SERVICE
53/tcp open domain
80/tcp open http
patriq wrote:C2 is httpsforty-six wrote:& C2 = down :cry:what do you mean down?
nmap -v -v -n -F -PN -P0 -sS 208.91.197.54
Code: Select allStarting Nmap 5.21 ( http://nmap.org ) at 2013-10-04 10:33 EDT Initiating SYN Stealth Scan at 10:33 Scanning 208.91.197.54 [100 ports] Discovered open port 53/tcp on 208.91.197.54 Discovered open port 80/tcp on 208.91.197.54 Completed SYN Stealth Scan at 10:33, 5.23s elapsed (100 total ports) Nmap scan report for 208.91.197.54 Host is up (0.087s latency). Scanned at 2013-10-04 10:33:54 EDT for 5s Not shown: 98 filtered ports PORT STATE SERVICE 53/tcp open domain 80/tcp open http
but it is redirecting browser requests to hxxp://searchtermresults.com/
hxxps://eewuiwiu.cc/ping.html
hxxps://xigizubu.cc/ping.html
hxxps://eilahcha.cc/ping.html
hxxps://fey.su/ping.html
hxxps://exy.su/ping.html