It is quite common for attackers to attempt to drop a malicious script
(or other executable file) that instructs the victim host to connect to
an IRC channel, listening for commands from the master. Details
about the IRC channel used for these attacks are extracted automatically
by Honerix, and are shown in the table below.
The following table is limited to details about the latest 20 IRC channels we observed.
|Details||Resource(s)||IRC Server||IRC Port||IRC Channel||First activity||Last seen||Toolbox|