Infected Target: 192.168.71.139 Score: 1.3 (>= 0.8) Infector List: Egg Source List: C & C List: 69.50.175.178 Peer Coord. List: Resource List: Observed Start: 06/28/2008 23:48:37.604 PDT Gen. Time: 06/29/2008 00:02:12.655 PDT INBOUND SCAN EXPLOIT EXPLOIT (slade) EGG DOWNLOAD C and C TRAFFIC 69.50.175.178 (23:48:38.653 PDT) event=1:2003251 {tcp} E4[rb] ET MALWARE SpySheriff Intial Phone Home 3007->80 (23:48:38.653 PDT) PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT 69.50.175.178 (2) (23:48:37.604 PDT) event=1:2406000 {tcp} E8[rb] ET rbN Known Russian Business Network Traffic - Hosting Nets 3007->80 (23:48:37.604 PDT) ------------------------- event=1:2406023 {tcp} E8[rb] ET rbN Known Russian Business Network Monitored Domains (19) 3007->80 (23:48:37.604 PDT) tcpslice 1214722117.604 1214722117.605 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.71.139'