Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:28:27.491 PST Gen. Time: 01/26/2013 12:28:27.491 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (12:28:27.491 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:28:27.491 PST) tcpslice 1359232107.491 1359232107.492 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:28:27.491 PST Gen. Time: 01/26/2013 12:31:59.764 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (2) (12:28:27.491 PST) event=777:7777008 (2) {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:28:27.491 PST) 0->0 (12:30:02.408 PST) tcpslice 1359232107.491 1359232107.492 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:38:17.400 PST Gen. Time: 01/26/2013 12:38:17.400 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (12:38:17.400 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 25 IPs (25 /24s) (# pkts S/M/O/I=0/25/0/0): 445:25, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:38:17.400 PST) tcpslice 1359232697.400 1359232697.401 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:40:27.416 PST Gen. Time: 01/26/2013 12:40:27.416 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (12:40:27.416 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 27 IPs (27 /24s) (# pkts S/M/O/I=0/27/0/0): 445:27, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:40:27.416 PST) tcpslice 1359232827.416 1359232827.417 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:44:33.428 PST Gen. Time: 01/26/2013 12:44:33.428 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (12:44:33.428 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 28 IPs (28 /24s) (# pkts S/M/O/I=0/28/0/0): 445:28, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:44:33.428 PST) tcpslice 1359233073.428 1359233073.429 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:44:33.428 PST Gen. Time: 01/26/2013 12:48:34.358 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (2) (12:44:33.428 PST) event=777:7777008 (2) {tcp} E8[bh] Detected intense malware port scanning of 28 IPs (28 /24s) (# pkts S/M/O/I=0/28/0/0): 445:28, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:44:33.428 PST) 0->0 (12:47:32.410 PST) tcpslice 1359233073.428 1359233073.429 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:51:38.428 PST Gen. Time: 01/26/2013 12:51:38.428 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (12:51:38.428 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 32 IPs (32 /24s) (# pkts S/M/O/I=0/32/0/0): 445:32, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:51:38.428 PST) tcpslice 1359233498.428 1359233498.429 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:51:38.428 PST Gen. Time: 01/26/2013 12:54:19.585 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (2) (12:51:38.428 PST) event=777:7777008 (2) {tcp} E8[bh] Detected intense malware port scanning of 32 IPs (32 /24s) (# pkts S/M/O/I=0/32/0/0): 445:32, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (12:51:38.428 PST) 0->0 (12:53:08.522 PST) tcpslice 1359233498.428 1359233498.429 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:59:03.427 PST Gen. Time: 01/26/2013 12:59:03.427 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (12:59:03.427 PST) event=777:7777008 {icmp} E8[bh] Detected intense malware port scanning of 34 IPs (34 /24s) (# pkts S/M/O/I=0/33/1/0): 445:33, [] MAC_Src: 00:21:1C:EE:14:00 (12:59:03.427 PST) tcpslice 1359233943.427 1359233943.428 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 12:59:03.427 PST Gen. Time: 01/26/2013 13:02:49.524 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (2) (12:59:03.427 PST) event=777:7777008 (2) {icmp} E8[bh] Detected intense malware port scanning of 34 IPs (34 /24s) (# pkts S/M/O/I=0/33/1/0): 445:33, [] MAC_Src: 00:21:1C:EE:14:00 (12:59:03.427 PST) 0->0 (13:01:07.353 PST) tcpslice 1359233943.427 1359233943.428 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.77 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/26/2013 13:04:37.568 PST Gen. Time: 01/26/2013 13:04:37.568 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 186.109.124.79 (13:04:37.568 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 36 IPs (36 /24s) (# pkts S/M/O/I=0/35/1/0): 445:35, [] MAC_Src: 00:21:1C:EE:14:00 0->0 (13:04:37.568 PST) tcpslice 1359234277.568 1359234277.569 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.77' ============================== SEPARATOR ================================