Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 199.217.119.217 Peer Coord. List: Resource List: Observed Start: 01/27/2013 20:16:41.020 PST Gen. Time: 01/27/2013 20:17:13.436 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 199.217.119.217 (20:17:13.436 PST) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 80->56230 (20:17:13.436 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 199.217.119.217 (8) (20:16:41.020 PST) event=1:552123 (8) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->42491 (20:16:41.020 PST) 80->44307 (20:16:45.141 PST) 80->45123 (20:16:47.068 PST) 80->45843 (20:16:48.985 PST) 80->49930 (20:16:58.644 PST) 80->50700 (20:17:00.528 PST) 80->51561 (20:17:02.648 PST) 80->54484 (20:17:09.317 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1359346601.020 1359346601.021 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================ Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 199.217.119.217 (9) Peer Coord. List: Resource List: Observed Start: 01/27/2013 20:16:41.020 PST Gen. Time: 01/27/2013 20:20:42.759 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 199.217.119.217 (9) (20:17:13.436 PST-20:17:13.494 PST) event=1:2002033 (9) {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 9: 80->56230 (20:17:13.436 PST-20:17:13.494 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 199.217.119.217 (12) (20:16:41.020 PST) event=1:552123 (12) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->42491 (20:16:41.020 PST) 80->44307 (20:16:45.141 PST) 80->45123 (20:16:47.068 PST) 80->45843 (20:16:48.985 PST) 80->49930 (20:16:58.644 PST) 80->50700 (20:17:00.528 PST) 80->51561 (20:17:02.648 PST) 80->54484 (20:17:09.317 PST) 80->59075 (20:17:19.526 PST) 80->59822 (20:17:21.422 PST) 80->60748 (20:17:23.652 PST) 80->33352 (20:17:25.725 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1359346601.020 1359346633.495 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================