Avast WEBforum

Other => General Topics => Topic started by: polonus on April 06, 2010, 08:08:09 PM

Title: Zeus botnet providers' escape....
Post by: polonus on April 06, 2010, 08:08:09 PM
Hi malware fighters,

Zeus CC servers are escaping to so-called FastFlux botnet, because bulletproof Zeus botnet providers like recently Trojac are being closed down, criminal ISPs are checked by their upstream providers so the going gets narrow. For Zeus bot activity see: https://zeustracker.abuse.ch/statistic.php
Take one at a once particular Zeus  IP:  superlayout.org
Summary
•Computer Threats:       1.
General Info
•Identity Threats:       0
•Annoyance factors:      0

   
Total threats on this site:    1

Web Site Location     China


superlayout.org
Threat Report

Total threats found: 1

Small-whitebg-red    Virus

Threats found: 1
Here is a complete list:
Threat Name:    Packed.Generic.292
Location:    Location:      hxtp://superlayout.org/125/tyu7.exe (not actual - domain suspended)

Here apparently nothing found: http://scanner.novirusthanks.org/analysis/7c36152228e787558257a7de4394cce6/aW5kZXg=/
because domain was suspended: https://zeustracker.abuse.ch/removals.php?host=superlayout.org

Recent listing( for home users): http://www.malwaredomains.com/wordpress/?cat=63

polonus