Score: 1.1 (>= 0.8) Infected Target: 192.168.1.203 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/13/2013 16:25:29.991 PST Gen. Time: 01/13/2013 16:25:30.109 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.129.85.200 (16:25:29.991 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:25:29.991 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.129.85.200 (16:25:30.109 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:25:30.109 PST) tcpslice 1358123129.991 1358123129.992 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.203' ============================== SEPARATOR ================================ Score: 1.4 (>= 0.8) Infected Target: 192.168.1.203 Infector List: 87.5.157.108 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/13/2013 16:25:29.991 PST Gen. Time: 01/13/2013 16:31:36.176 PST INBOUND SCAN EXPLOIT 87.5.157.108 (14) (16:26:13.920 PST-16:27:20.131 PST) event=1:22000032 {tcp} E2[rb] ET EXPLOIT LSA exploit, [] MAC_Dst: 00:30:48:30:03:AE 445<-56215 (16:27:28.546 PST) ------------------------- event=1:22000046 {tcp} E2[rb] ET NETBIOS MS04011 Lsasrv.dll RPC exploit (Win2k), [] MAC_Dst: 00:30:48:30:03:AE 445<-56215 (16:27:28.546 PST) ------------------------- event=1:22314 (5) {tcp} E2[rb] GPL SHELLCODE x86 0x90 NOOP unicode, [] MAC_Dst: 00:30:48:30:03:AE 5: 445<-56215 (16:26:13.920 PST-16:27:20.131 PST) ------------------------- event=1:22514 (2) {tcp} E2[rb] GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt, [] MAC_Dst: 00:30:48:30:03:AE 2: 445<-56215 (16:26:33.793 PST-16:27:20.087 PST) ------------------------- event=1:2653 (5) {tcp} E2[rb] GPL SHELLCODE x86 0x90 unicode NOOP, [] MAC_Dst: 00:30:48:30:03:AE 5: 445<-56215 (16:26:13.920 PST-16:27:20.131 PST) EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.129.85.200 (16:25:29.991 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:25:29.991 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.129.85.200 (16:25:30.109 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:25:30.109 PST) tcpslice 1358123129.991 1358123240.132 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.203' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.203 Infector List: 125.58.92.154 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/13/2013 18:01:34.227 PST Gen. Time: 01/13/2013 18:01:34.505 PST INBOUND SCAN EXPLOIT 125.58.92.154 (18:01:34.227 PST) event=1:22351 {tcp} E2[rb] REGISTERED FREE NETBIOS DCERPC ISystemActivator path overflow attempt little endian unicode, [] MAC_Dst: 00:30:48:30:03:AE 135<-2743 (18:01:34.227 PST) EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 125.58.92.154 (18:01:34.505 PST) event=1:552123 {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:30:48:30:03:AE 1031->707 (18:01:34.505 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1358128894.227 1358128894.228 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.203' ============================== SEPARATOR ================================ Score: 1.3 (>= 0.8) Infected Target: 192.168.1.203 Infector List: 125.58.92.154 Egg Source List: 125.58.92.154 C & C List: Peer Coord. List: Resource List: Observed Start: 01/13/2013 18:01:34.227 PST Gen. Time: 01/13/2013 18:05:57.616 PST INBOUND SCAN EXPLOIT 125.58.92.154 (18:01:34.227 PST) event=1:22351 {tcp} E2[rb] REGISTERED FREE NETBIOS DCERPC ISystemActivator path overflow attempt little endian unicode, [] MAC_Dst: 00:30:48:30:03:AE 135<-2743 (18:01:34.227 PST) EXPLOIT MALWARE DNS EGG DOWNLOAD 125.58.92.154 (6) (18:01:36.074 PST) event=1:1444 (2) {udp} E3[rb] TFTP GET from external source, [] MAC_Src: 00:30:48:30:03:AF 1032->69 (18:01:36.074 PST) 1033->69 (18:01:52.177 PST) ------------------------- event=1:2008120 (2) {udp} E3[rb] ET POLICY Outbound TFTP Read Request, [] MAC_Src: 00:30:48:30:03:AF 1032->69 (18:01:36.074 PST) 1033->69 (18:01:52.177 PST) ------------------------- event=1:3001441 (2) {udp} E3[rb] TFTP GET .exe from external source, [] MAC_Src: 00:30:48:30:03:AF 1032->69 (18:01:36.074 PST) 1033->69 (18:01:52.177 PST) C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 125.58.92.154 (18:01:34.505 PST) event=1:552123 {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:30:48:30:03:AE 1031->707 (18:01:34.505 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1358128894.227 1358128894.228 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.203' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.203 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/13/2013 19:55:03.899 PST Gen. Time: 01/13/2013 19:55:04.043 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.224.160.126 (19:55:03.899 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 135:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (19:55:03.899 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.224.160.126 (19:55:04.043 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 135:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (19:55:04.043 PST) tcpslice 1358135703.899 1358135703.900 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.203' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.203 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/13/2013 20:00:01.726 PST Gen. Time: 01/13/2013 20:00:01.726 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.197.10.125 (20:00:01.726 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 26 IPs (26 /24s) (# pkts S/M/O/I=0/26/0/0): 135:25, 445, [] MAC_Src: 00:30:48:30:03:AF 0->0 (20:00:01.726 PST) tcpslice 1358136001.726 1358136001.727 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.203' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.203 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/13/2013 22:01:20.575 PST Gen. Time: 01/13/2013 22:01:20.815 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.173.235.98 (22:01:20.575 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (22:01:20.575 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.203.91.212 (22:01:20.815 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (22:01:20.815 PST) tcpslice 1358143280.575 1358143280.576 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.203' ============================== SEPARATOR ================================