[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+WKUVv+zfycN6dcfvtdE2bny+GgEAZg8sq0HGWoWhniS3VfjA@mail.gmail.com>
Date: Mon, 21 Apr 2014 22:07:14 +0100
From: Kevin Breen <mymalwaresamples@...il.com>
To: undisclosed-recipients:;
Subject: [FD] RAT C2 Domains
This is going out to a few lists, so apologies for those who get this a few
times.
As part of my project researching RATS - http://malwareconfig.com
http://techanarchy.net/2014/04/rat-decoders/
I am finding myself with a large dataset of known Bad C2 Domains and IP's,
Most of these are hosted on service like no-ip.
So my question, other than an email to the abuse@.... email address are
there any services that can make use of this data. As they are not web
services on 80 im not sure if the normal range of web reputation databases
can make use or not.
Thoughts
Kev
--
Kevin Breen - Malware Analyst
*Pinky*: "Gee, Brain, what do you want to do tonight?"
*The Brain*: "The same thing we do every night, Pinky—try to take over the
world!"
*Find Me On Linkedin <http://uk.linkedin.com/in/kevbreen/>
<http://uk.linkedin.com/in/kevbreen/>*
*Fork Me On GitHub <https://github.com/kevthehermit>*
*http://techanarchy.net <http://techanarchy.net/>*
http://malwareconfig.com
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists