Score: 0.8 (>= 0.8) Infected Target: 192.168.1.102 Infector List: Egg Source List: C & C List: Peer Coord. List: 13.7.64.20, 129.21.123.161 Resource List: Observed Start: 01/25/2013 04:18:01.001 PST Gen. Time: 01/25/2013 04:18:38.421 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info 13.7.64.20 (04:18:01.001 PST) event=1:1100012 {tcp} E7[info] P2P BitTorrent handshake, [] MAC_Src: 00:21:5A:08:EC:40 58103->6881 (04:18:01.001 PST) 129.21.123.161 (04:18:11.553 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6882->38445 (04:18:11.553 PST) PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port 8.5.1.45 (04:18:38.421 PST) event=1:9930009 {tcp} E8[unk] ET ShadowServer confirmed botnet control server on non-standard port, [] MAC_Src: 00:21:5A:08:EC:40 32943->49302 (04:18:38.421 PST) DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1359116281.001 1359116281.002 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.102' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.102 Infector List: Egg Source List: C & C List: Peer Coord. List: 130.237.43.220, 13.7.64.20, 68.49.1.47, 182.235.0.116, 149.43.80.22, 129.21.123.161 Resource List: Observed Start: 01/25/2013 04:18:01.001 PST Gen. Time: 01/25/2013 04:22:13.185 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info 130.237.43.220 (04:18:56.629 PST) event=1:1100018 {tcp} E7[info] P2P torrent announce tracker request, [] MAC_Src: 00:21:5A:08:EC:40 46385->6969 (04:18:56.629 PST) 13.7.64.20 (04:18:01.001 PST) event=1:1100012 {tcp} E7[info] P2P BitTorrent handshake, [] MAC_Src: 00:21:5A:08:EC:40 58103->6881 (04:18:01.001 PST) 68.49.1.47 (04:19:11.929 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6882->46679 (04:19:11.929 PST) 182.235.0.116 (04:20:13.380 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6881->16001 (04:20:13.380 PST) 149.43.80.22 (04:21:14.261 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6882->6881 (04:21:14.261 PST) 129.21.123.161 (04:18:11.553 PST) event=1:1100013 {udp} E7[info] P2P torrent DHT ping, [] MAC_Src: 00:21:5A:08:EC:40 6882->38445 (04:18:11.553 PST) PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port 8.5.1.45 (04:18:38.421 PST) event=1:9930009 {tcp} E8[unk] ET ShadowServer confirmed botnet control server on non-standard port, [] MAC_Src: 00:21:5A:08:EC:40 32943->49302 (04:18:38.421 PST) DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1359116281.001 1359116281.002 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.102' ============================== SEPARATOR ================================