Score: 1.1 (>= 0.8) Infected Target: 192.168.1.102 Infector List: Egg Source List: 199.59.150.9, 199.59.149.232, 199.59.150.41, 199.59.148.87, 199.59.148.20 C & C List: 199.255.189.60, 72.51.47.21 Peer Coord. List: Resource List: Observed Start: 01/10/2013 10:57:24.743 PST Gen. Time: 01/10/2013 19:51:42.199 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD 199.59.150.9 (2) (11:02:56.810 PST-11:03:26.816 PST) event=1:2013036 (2) {tcp} E3[rb] ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby, [] MAC_Src: 00:21:1C:EE:14:00 2: 36528<-80 (11:02:56.810 PST-11:03:26.816 PST) 199.59.149.232 (10:58:11.516 PST) event=1:2013036 {tcp} E3[rb] ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby, [] MAC_Src: 00:21:1C:EE:14:00 35948<-80 (10:58:11.516 PST) 199.59.150.41 (11:00:24.996 PST) event=1:2013036 {tcp} E3[rb] ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby, [] MAC_Src: 00:21:1C:EE:14:00 55263<-80 (11:00:24.996 PST) 199.59.148.87 (7) (10:57:24.743 PST-11:06:55.539 PST) event=1:2013036 (7) {tcp} E3[rb] ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby, [] MAC_Src: 00:21:1C:EE:14:00 2: 37672<-80 (11:06:25.536 PST-11:06:55.539 PST) 49959<-80 (10:57:24.743 PST) 2: 52507<-80 (11:04:43.372 PST-11:05:13.375 PST) 2: 50491<-80 (10:59:13.232 PST-10:59:43.237 PST) 199.59.148.20 (6) (11:01:07.691 PST-11:04:27.587 PST) event=1:2013036 (6) {tcp} E3[rb] ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby, [] MAC_Src: 00:21:1C:EE:14:00 2: 56525<-80 (11:03:57.580 PST-11:04:27.587 PST) 35175<-80 (11:05:43.439 PST) 47427<-80 (11:01:07.691 PST) 2: 57882<-80 (11:02:07.863 PST-11:02:37.863 PST) C and C TRAFFIC 199.255.189.60 (19:51:42.199 PST) event=1:2012801 {tcp} E4[rb] ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/biz/baked-by-melissa-new-york?start=360&sort_by=date_desc&rpp=40] MAC_Src: 00:21:5A:08:EC:40 47162->80 (19:51:42.199 PST) C and C TRAFFIC (RBN) 72.51.47.21 (12:06:53.086 PST) event=1:3810007 {tcp} E4[nbr] ET Known Russian Business Network Monitored Domain, [] MAC_Src: 00:21:5A:08:EC:40 43750->80 (12:06:53.086 PST) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1357844244.743 1357844815.540 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.102' ============================== SEPARATOR ================================