Score: 1.1 (>= 0.8) Infected Target: 192.168.1.87 Infector List: Egg Source List: C & C List: 74.125.224.52 Peer Coord. List: Resource List: Observed Start: 07/17/2012 14:10:48.274 PDT Gen. Time: 07/17/2012 14:10:54.492 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 74.125.224.52 (14:10:48.274 PDT) event=1:2009024 {tcp} E4[rb] ET TROJAN Downadup/Conficker A or B Worm reporting, [/search?q=538] MAC_Src: 00:01:64:FF:CE:EA 60435->80 (14:10:48.274 PDT) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION DECLARE BOT Standard Port 138.108.7.20 (14:10:54.492 PDT) event=1:9920005 {tcp} E8[std] BotHunter REPO confirmed botnet control server on standard port, [] MAC_Src: 00:01:64:FF:CE:EA 60486->80 (14:10:54.492 PDT) DECLARE BOT Non-standard Port DECLARE BOT tcpslice 1342559448.274 1342559448.275 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.87' ============================== SEPARATOR ================================