Author Topic: LSD - Spreading RAT | Claims to have multiple BL slaves | Lot's keys |  (Read 6036 times)


"drama me, I have more"

He obviously doesn't know how a key revoke works.
How do you think it does then?

How do you think it does then?
The IP of his original key is traced to others and then they are revoked as well.

The IP of his original key is traced to others and then they are revoked as well.
Well we can get the IP from his rat if he uses it on his OWN pc without any proxy / vpn. Or badspot can get his IP if he haven't used VPN on BL.

http://forum.returntoblockland.com/list.php?cmd=view&id=39681

Ok, so we see he's used the name "MDMA".

MDMA's 90's Hip-Hop Pack #1, posted by 420.
* note that this user is the one who posted the Minecraft accounts for .008 BTC thread just 4 hours ago.

To double check ourselves, we can search "MDMA" on RTB's ID list and see that no one else has used the username.

The forum account 420 is tied to the ID 23344. One of the past names on this ID is "Pineapple", and while it seems like a generic name, searching it on RTB comes up with ID 7714, which has multiple username overlap with the previously stated ID. In addition, user 420 said in a previous post that "My BL_ID is in the 7ks lol".

Going with the 7714 ID, it is tied to the forum account T£C, which sadly only has two posts, both about a Cigar Model request. However, this post in a "What is your ID?" thread shows the user massa900 stating his ID is 7714 (it's in small text below the -1). He could be just saying that, but he too requested a Cigar Item.

Note that massa900 was a previously banned user for creating a Leaving forever topic and in his recent posting history created topics such as I almost got arrested again, which talks about drugs and can possibly justify his obsession with drug-based usernames.

The above information may or may not be accurate but feel free to use it as a starting point.

The IP of his original key is traced to others and then they are revoked as well.
Because he obviously doesn't use a vpn if he plans to spread rats.

Because he obviously doesn't use a vpn if he plans to spread rats.
You can never know.

Because he obviously doesn't use a vpn if he plans to spread rats.
You're implying this guy is at all smart enough to do that. He admitted it was a RAT after all.

"LSD"
"THC"
"MDMA"
These have to stand for something.
wicked drugs broo! molly weed and lsd get high every day on dem scripts!!! high as forget!!!!

Seriously, why is this all happening right now? Did one person start it, now everyone else wants to look cool? I remember this happened a little while back.



Nice detective work
He's gonna have a lot of keys revoked

* note that this user is the one who posted the Minecraft accounts for .008 BTC thread just 4 hours ago.

He edited out all his posts, but it's not like I didn't expect it at this point. If you missed it this was the OP:



As Ainille posted in the thread, it would be reasonable to assume the accounts he's selling are ones he RATed.


"LSD"
"THC"
"MDMA"
These have to stand for something.
looooooooooool they're drugs.

Okay Ainille sent me a copy of that appearantly evil chat bot.

Well... let's get an idea of what this does and why it is actually bad. Shall we?

When run, it will unpack an embedded archive into a hidden folder at %userprofile%\jgayw\.  <-- gay!!
This folder then contains the following files:

56554.cmd
77645.vbs
KmHrdAQQB.VQK
mVpqAeG.exe
UFxo.KTP
VQShAqBQEs.QPS


It then shows a black DOS window and does seemingly nothing.
However, it secretly executes the 77645.vbs. That file contains:

const Hidden = 0
const WaitOnReturn = true
File ="""C:\Users\YourUsernameHere\jgayw\56554.cmd"""
set WshShell = CreateObject("WScript.Shell")
WshShell.Run file, Hidden, WaitOnReturn
wscript.quit


Note how it will already contain the full user path.
This basically executes the 56554.cmd file. Contains this:

@echo off
cd %userprofile%\jgayw\
start mVpqAeG.exe "KmHrdAQQB.VQK"


This executes the KmHrdAQQB.VQK file using mVpqAeG.exe. I've found that it uses this framework / scripting language.
That .vqk is actually a plaintext script file filled with 2 million lines of spam. Bad attempt at obfuscation, because if you remove them all with a simple regex find/replace you get this:

51,000 characters. Can't put in a post. Read the script here.
This script does some bad things. Well, it would, I guess, if you run it outside of a sandbox. If you care what then read it.

The VQShAqBQEs.QPS (referenced by the script) contains this:

[3797560]
9869251=2973211
[3508157]
9366118=9034676
[4523506]
4523506=jgayw


This appears to be some sort of simple config file.
However, the actually bad thing is the second thing this script can do.
It decrypts the UFxo.KTP, resulting in THIS THING and executes it.

Oh, and it also is able to tracelessly delete itself if told to.


>>disable LSD's key

"LSD"
"THC"
"MDMA"
These have to stand for something.
Are you loving joking