TeamSpeakCrack.com Botnet

Status
Not open for further replies.

L.

Well-Known Member
Sep 1, 2015
120
111
128
Hey Guys,
some of you might know "TeamSpeakCrack.com" they are selling cracked "Licensed hosting provider" so looks like he is using you as Bot for DDoSing.
PHP:
=====
185.XX.XXX.XXX.20770 > 125.77.XX.XXX.websm: Flags [S], cksum 0x3e59 (correct), seq 736753997:736754967, win 63821, length 970
04:48:56.125306 IP (tos 0x0, ttl 250, id 64102, offset 0, flags [DF], proto TCP (6), length 1010)
185.XX.XXX.XXX.42861 > 125.77.XX.XXX.websm: Flags [S], cksum 0x8fac (correct), seq 540632826:540633796, win 61362, length 970
04:48:56.125316 IP (tos 0x0, ttl 251, id 10628, offset 0, flags [DF], proto TCP (6), length 1010)
185.XX.XXX.XXX.10220 > 125.77.XX.XXX.websm: Flags [S], cksum 0xb6b0 (correct), seq 1373668393:1373669363, win 63833, length 970
04:48:56.125324 IP (tos 0x0, ttl 253, id 23986, offset 0, flags [DF], proto TCP (6), length 1010)
185.XX.XXX.XXX.25616 > 125.77.XX.XXX.websm: Flags [S], cksum 0x51c4 (correct), seq 1490596445:1490597415, win 60661, length 970
04:48:56.125331 IP (tos 0x0, ttl 250, id 46144, offset 0, flags [DF], proto TCP (6), length 1010)
185.XX.XXX.XXX.47895 > 125.77.XX.XXX.websm: Flags [S], cksum 0x8486 (correct), seq 1026638004:1026638974, win 61564, length 970
04:48:56.125342 IP (tos 0x0, ttl 254, id 20271, offset 0, flags [DF], proto TCP (6), length 1010)
=====
BBbmiY2.png
"AccountingServerEmulator-Linux" is infected
Don't buy his shit you can get it for free ;)

Regards

PS: i can upload you "his" Folder with the Crack so you can take a look at it.
 

L.

Well-Known Member
Sep 1, 2015
120
111
128
Would be interesting to take a look at :)

Where did you get this information from?
I will PM you with the full Folder.
One of my Friends bought it some Months ago and 2-3 Days ago his TS started lagging so i did take a look and saw that there is huge outcoming traffic.
Also asked the Server Support and they confirmed that it was the Emulator.

EDIT: *PMED*
 

L.

Well-Known Member
Sep 1, 2015
120
111
128
SYN Flood is strong
All are OVH IP's
K6yVsdJ.png

PHP:
185.XX.XXX.XXX.54241 > 192.XX.XXX.XX.http: Flags [S], cksum 0xda43 (correct), seq 935158886:935159842, win 60702, length 956
185.XX.XXX.XXX.58320 > 192.XX.XXX.XX.http: Flags [S], cksum 0x973b (correct), seq 609196849:609197805, win 64729, length 956
185.XX.XXX.XXX.23514 > 192.XX.XXX.XX.http: Flags [S], cksum 0x8d68 (correct), seq 32528377:32529333, win 62521, length 956
185.XX.XXX.XXX.17731 > 192.XX.XXX.XX.http: Flags [S], cksum 0xd503 (correct), seq 381622212:381623168, win 61084, length 956
185.XX.XXX.XXX.20006 > 192.XX.XXX.XX.http: Flags [S], cksum 0xd92d (correct), seq 1002624671:1002625627, win 64943, length 956
185.XX.XXX.XXX.57019 > 192.XX.XXX.XX.http: Flags [S], cksum 0x8db7 (correct), seq 252297384:252298340, win 64320, length 956
185.XX.XXX.XXX.ibm-diradm > 192.XX.XXX.XX.http: Flags [S], cksum 0x532e (correct), seq 824093587:824094543, win 63923, length 956
185.XX.XXX.XXX.61545 > 192.XX.XXX.XX.http: Flags [S], cksum 0xd731 (correct), seq 1833571796:1833572752, win 60588, length 956
185.XX.XXX.XXX.29414 > 192.XX.XXX.XX.http: Flags [S], cksum 0xbdfa (correct), seq 1685498359:1685499315, win 63511, length 956
185.XX.XXX.XXX.serialgateway > 192.XX.XXX.XX.http: Flags [S], cksum 0x6527 (correct), seq 774154384:774155340, win 63152, length 956

Diffrent IP's

185.XX.XXX.XXX.53604 > 198.XX.XXX.XXX.http: Flags [S], cksum 0x4caf (correct), seq 1102532085:1102533041, win 64957, length 956
185.XX.XXX.XXX.6478 > 192.XX.XXX.XXX.http: Flags [S], cksum 0x2846 (correct), seq 339865801:339866757, win 61641, length 956
 
Last edited:

Supervisor

Administrator
Apr 27, 2015
1,863
2,546
335
I did a simple hash comparison between the Accounting servers.. I guess your friend is having a different problem as the hash values match:
teamspeakcrack.com acc-server (linux):
b0f17ff100.png

r4p3.net acc-server (linux):
c4d12e27d7.png

teamspeakcrack.com acc-server (windows):
9f6e46b1a6.png

r4p3.net acc-server (windows):
751955cf5d.png


As you can see, they match. So neither r4p3.net nor teamspeakcrack.com altered the crack from mesmerize.
 

L.

Well-Known Member
Sep 1, 2015
120
111
128
"Patryk" is one guy from the Support Team.

I know.
 

Supervisor

Administrator
Apr 27, 2015
1,863
2,546
335
what support team are you talking about? The TeamSpeak support Team? hahaha :) I'd be surprised if they'd tell you anything different than to uninstall the crack.
Even some vps providers (if you have a managed server) will uninstall the crack, because it is "unwanted" software and, of course, it is a violation to the license agreement
 

L.

Well-Known Member
Sep 1, 2015
120
111
128
Talking about the blazingfast Support Team :)
 

Bluscream

Retired Staff
Contributor
May 8, 2015
967
934
211
Code:
    printf("TeamSpeak 3 Accounting Server Emulator v0.1 - Windows");
    printf("\n(c) MESMERiZE 2011\n\n");
    printf("-? / --help\t\t- Print this\n");
    printf("-f <file>\t- define logfile\n");
    printf("-s\t\t- silent mode, no logging\n");
    printf("-p\t\t- define listening port (don't use this yet)\n");

Good to know. Never tried "--help", lol

Code:
"C:\\cr\\doc\\libs\\libtomcrypt\\src\\pk\\ecc\\ecc_import.c"
"c:\\cr\\doc\\libs\\libtomcrypt\\libtomcrypt-1.17\\src\\math\\ltm_desc.c"
https://github.com/libtom/libtomcrypt

Is also interesting...

+ Some example log with the mesmerize license key:
Code:
Tue Sep 29 17:12:20 2015
---begin client handler---
Tue Sep 29 17:12:20 2015
Server key data successfully initialized...
Tue Sep 29 17:12:20 2015
allocating memory for input buffer...
Tue Sep 29 17:12:20 2015
Awaiting packet from client...
Tue Sep 29 17:12:20 2015
Received client packet...
Tue Sep 29 17:12:20 2015
This must be the Hello-Packet from the client...
Tue Sep 29 17:12:20 2015
Received client packet...
Tue Sep 29 17:12:20 2015
This must be the encrypted key from the client...
Tue Sep 29 17:12:20 2015
Key from client successfully decrypted...
Tue Sep 29 17:12:20 2015
Setting up local key material...
Tue Sep 29 17:12:20 2015
Received client packet...
Tue Sep 29 17:12:20 2015
This must be the encrypted client license data header...
Tue Sep 29 17:12:21 2015
Received client packet...
Tue Sep 29 17:12:21 2015
This must be the encrypted client license data...
Tue Sep 29 17:12:21 2015
Sending server response to client
Tue Sep 29 17:12:21 2015
Received client packet...
Tue Sep 29 17:12:21 2015
This must be the last message the client sends to the accounting server...
Tue Sep 29 17:12:21 2015
---end client handler---
 
Last edited:

Bluscream

Retired Staff
Contributor
May 8, 2015
967
934
211
Well they use the same library as teamspeak :)

Are they only using this on the Server<->Accountingserver way or also on the Client<->Server way? If so we could build fake join packets 'n stuff :D
 
Status
Not open for further replies.
Top