Score: 1.1 (>= 0.8) Infected Target: 192.168.1.187 Infector List: Egg Source List: 173.194.8.109 C & C List: Peer Coord. List: Resource List: Observed Start: 07/17/2012 09:54:01.348 PDT Gen. Time: 07/17/2012 09:58:41.454 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD 173.194.8.109 (09:58:41.454 PDT) event=1:2000419 {tcp} E3[rb] ET POLICY PE EXE or DLL Windows file download, [] MAC_Src: 00:21:1C:EE:14:00 49979<-80 (09:58:41.454 PDT) C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION DECLARE BOT Standard Port 216.223.0.211 (09:54:01.348 PDT) event=1:9920005 {tcp} E8[std] BotHunter REPO confirmed botnet control server on standard port, [] MAC_Src: 00:01:64:FF:CE:EA 49444->80 (09:54:01.348 PDT) DECLARE BOT Non-standard Port DECLARE BOT tcpslice 1342544041.348 1342544041.349 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.187' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.187 Infector List: Egg Source List: 173.194.8.109, 173.194.8.213 C & C List: Peer Coord. List: Resource List: Observed Start: 07/17/2012 09:54:01.348 PDT Gen. Time: 07/17/2012 10:01:55.173 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD 173.194.8.109 (3) (09:58:41.454 PDT) event=1:2000419 {tcp} E3[rb] ET POLICY PE EXE or DLL Windows file download, [] MAC_Src: 00:21:1C:EE:14:00 49979<-80 (09:58:41.454 PDT) ------------------------- event=1:2007671 {tcp} E3[rb] ET POLICY Binary Download Smaller than 1 MB Likely Hostile, [] MAC_Src: 00:21:1C:EE:14:00 49979<-80 (09:58:41.454 PDT) ------------------------- event=1:3300007 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host, [] MAC_Src: 00:21:1C:EE:14:00 49979<-80 (09:58:41.454 PDT) 173.194.8.213 (2) (09:58:45.469 PDT) event=1:2008576 {tcp} E3[rb] ET TROJAN TinyPE Binary - Possibly Hostile, [] MAC_Src: 00:21:1C:EE:14:00 49980<-80 (09:58:45.469 PDT) ------------------------- event=1:3300007 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host, [] MAC_Src: 00:21:1C:EE:14:00 49980<-80 (09:58:45.469 PDT) C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION DECLARE BOT Standard Port 216.223.0.211 (09:54:01.348 PDT) event=1:9920005 {tcp} E8[std] BotHunter REPO confirmed botnet control server on standard port, [] MAC_Src: 00:01:64:FF:CE:EA 49444->80 (09:54:01.348 PDT) DECLARE BOT Non-standard Port DECLARE BOT tcpslice 1342544041.348 1342544041.349 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.187' ============================== SEPARATOR ================================