Score: 0.8 (>= 0.8) Infected Target: 192.168.1.102 Infector List: Egg Source List: C & C List: Peer Coord. List: 130.237.43.220, 112.140.74.15, 204.123.28.57, 111.69.193.136 Resource List: Observed Start: 01/23/2013 14:25:00.869 PST Gen. Time: 01/23/2013 14:26:30.753 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info 130.237.43.220 (14:25:40.105 PST) event=1:1100018 {tcp} E7[info] P2P torrent announce tracker request, [] MAC_Src: 00:21:5A:08:EC:40 42868->6969 (14:25:40.105 PST) 112.140.74.15 (14:26:05.974 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6881->56186 (14:26:05.974 PST) 204.123.28.57 (14:25:54.028 PST) event=1:1100012 {tcp} E7[info] P2P BitTorrent handshake, [] MAC_Src: 00:21:5A:08:EC:40 45642->6881 (14:25:54.028 PST) 111.69.193.136 (14:25:00.869 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6882->17572 (14:25:00.869 PST) PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port 8.5.1.45 (14:26:30.753 PST) event=1:9930009 {tcp} E8[unk] ET ShadowServer confirmed botnet control server on non-standard port, [] MAC_Src: 00:21:5A:08:EC:40 57559->49302 (14:26:30.753 PST) DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1358979900.869 1358979900.870 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.102' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.102 Infector List: Egg Source List: C & C List: Peer Coord. List: 130.237.43.220, 112.140.74.15, 109.195.67.230, 204.123.28.57, 86.218.60.99, 111.69.193.136 Resource List: Observed Start: 01/23/2013 14:25:00.869 PST Gen. Time: 01/23/2013 14:28:56.945 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info 130.237.43.220 (14:25:40.105 PST) event=1:1100018 {tcp} E7[info] P2P torrent announce tracker request, [] MAC_Src: 00:21:5A:08:EC:40 42868->6969 (14:25:40.105 PST) 112.140.74.15 (14:26:05.974 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6881->56186 (14:26:05.974 PST) 109.195.67.230 (14:27:05.185 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6882->39363 (14:27:05.185 PST) 204.123.28.57 (14:25:54.028 PST) event=1:1100012 {tcp} E7[info] P2P BitTorrent handshake, [] MAC_Src: 00:21:5A:08:EC:40 45642->6881 (14:25:54.028 PST) 86.218.60.99 (14:28:07.642 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6881->22373 (14:28:07.642 PST) 111.69.193.136 (14:25:00.869 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6882->17572 (14:25:00.869 PST) PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port 8.5.1.45 (14:26:30.753 PST) event=1:9930009 {tcp} E8[unk] ET ShadowServer confirmed botnet control server on non-standard port, [] MAC_Src: 00:21:5A:08:EC:40 57559->49302 (14:26:30.753 PST) DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1358979900.869 1358979900.870 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.102' ============================== SEPARATOR ================================