Score: 0.8 (>= 0.8) Infected Target: 192.168.1.169 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 06/20/2011 08:18:08.076 PDT Gen. Time: 06/20/2011 08:18:08.076 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION DECLARE BOT 93.177.237.176 (08:18:08.076 PDT) event=1:9910023 {tcp} E8[rb] BotHunter Malware propagation attack source, [] MAC_Src: 00:30:48:30:03:AF 445->8287 (08:18:08.076 PDT) tcpslice 1308583088.076 1308583088.077 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.169' ============================== SEPARATOR ================================ Score: 2.1 (>= 0.8) Infected Target: 192.168.1.169 Infector List: 93.177.237.176 Egg Source List: 93.177.237.176 C & C List: 213.155.0.224 Peer Coord. List: Resource List: Observed Start: 06/20/2011 08:18:08.076 PDT Gen. Time: 06/20/2011 08:22:21.577 PDT INBOUND SCAN EXPLOIT 93.177.237.176 (4) (08:18:09.346 PDT-08:18:09.347 PDT) event=1:22000032 {tcp} E2[rb] ET EXPLOIT LSA exploit, [] MAC_Dst: 00:30:48:30:03:AE 445<-8287 (08:18:09.347 PDT) ------------------------- event=1:22000033 {tcp} E2[rb] ET EXPLOIT MS04011 Lsasrv.dll RPC exploit (WinXP), [] MAC_Dst: 00:30:48:30:03:AE 445<-8287 (08:18:09.347 PDT) ------------------------- event=1:2299913 (2) {tcp} E2[rb] ET SHELLCODE x86 0x90 unicode NOOP, [] MAC_Dst: 00:30:48:30:03:AE 2: 445<-8287 (08:18:09.346 PDT-08:18:09.347 PDT) EXPLOIT MALWARE DNS EGG DOWNLOAD 93.177.237.176 (4) (08:18:09.853 PDT) event=1:2000419 {tcp} E3[rb] ET POLICY PE EXE or DLL Windows file download, [] MAC_Src: 00:21:1C:EE:14:00 1031<-2360 (08:18:10.266 PDT) ------------------------- event=1:3300003 {tcp} E3[rb] BotHunter HTTP-based .exe Upload on backdoor port, [] MAC_Src: 00:30:48:30:03:AF 1031->2360 (08:18:09.853 PDT) ------------------------- event=1:3300004 {tcp} E3[rb] BotHunter HTTP-based .exe Upload on backdoor port, [] MAC_Src: 00:21:1C:EE:14:00 1031<-2360 (08:18:10.263 PDT) ------------------------- event=1:3300007 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host, [] MAC_Src: 00:21:1C:EE:14:00 1031<-2360 (08:18:10.266 PDT) C and C TRAFFIC 213.155.0.224 (08:18:13.611 PDT) event=1:2003070 {tcp} E4[rb] ET WORM Korgo.U Reporting, [/index.php?id=akggkxnyxbxihmywzi&scn=4&inf=0&ver=19&cnt=USA] MAC_Src: 00:30:48:30:03:AF 1039->80 (08:18:13.611 PDT) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION DECLARE BOT 213.155.0.224 (08:18:13.414 PDT) event=1:9910003 {tcp} E8[rb] BotHunter MTC confirmed botnet control server, [] MAC_Src: 00:30:48:30:03:AF 1039->80 (08:18:13.414 PDT) 93.177.237.176 (2) (08:18:08.076 PDT) event=1:9910005 {tcp} E8[rb] BotHunter REPO confirmed botnet control server, [] MAC_Src: 00:30:48:30:03:AF 1031->2360 (08:18:09.669 PDT) ------------------------- event=1:9910023 {tcp} E8[rb] BotHunter Malware propagation attack source, [] MAC_Src: 00:30:48:30:03:AF 445->8287 (08:18:08.076 PDT) tcpslice 1308583088.076 1308583089.348 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.169' ============================== SEPARATOR ================================