Score: 0.8 (>= 0.8) Infected Target: 192.168.1.208 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 06/20/2011 04:50:53.615 PDT Gen. Time: 06/20/2011 04:50:53.615 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION DECLARE BOT 83.133.119.197 (04:50:53.615 PDT) event=1:9910005 {tcp} E8[rb] BotHunter REPO confirmed botnet control server, [] MAC_Src: 00:30:48:30:03:AF 1032->65520 (04:50:53.615 PDT) tcpslice 1308570653.615 1308570653.616 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.208' ============================== SEPARATOR ================================ Score: 1.7 (>= 0.8) Infected Target: 192.168.1.208 Infector List: Egg Source List: C & C List: 83.133.119.197, 83.133.119.197 Peer Coord. List: Resource List: Observed Start: 06/20/2011 04:50:53.615 PDT Gen. Time: 06/20/2011 04:55:01.061 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 83.133.119.197 (04:50:53.942 PDT) event=1:2003603 {tcp} E4[rb] ET TROJAN W32.Virut.A joining an IRC Channel, [] MAC_Src: 00:30:48:30:03:AF 1032->65520 (04:50:53.942 PDT) C and C TRAFFIC (RBN) 83.133.119.197 (04:50:53.780 PDT) event=1:3810007 {tcp} E4[nbr] ET Known Russian Business Network Monitored Domain, [] MAC_Src: 00:30:48:30:03:AF 1032->65520 (04:50:53.780 PDT) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION DECLARE BOT 83.133.119.197 (3) (04:50:53.615 PDT) event=1:9910003 {tcp} E8[rb] BotHunter MTC confirmed botnet control server, [] MAC_Src: 00:30:48:30:03:AF 1032->65520 (04:50:53.615 PDT) ------------------------- event=1:9910005 {tcp} E8[rb] BotHunter REPO confirmed botnet control server, [] MAC_Src: 00:30:48:30:03:AF 1032->65520 (04:50:53.615 PDT) ------------------------- event=1:9910009 {tcp} E8[rb] ET ShadowServer confirmed botnet control server, [] MAC_Src: 00:30:48:30:03:AF 1032->65520 (04:50:53.615 PDT) tcpslice 1308570653.615 1308570653.616 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.208' ============================== SEPARATOR ================================