Score: 1.1 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 01:33:55.230 PST Gen. Time: 01/30/2013 01:33:55.334 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.19.70.11 (01:33:55.230 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (01:33:55.230 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.226.95.230 (01:33:55.334 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/20/0/1): 445:20, [] MAC_Src: 00:30:48:30:03:AF 0->0 (01:33:55.334 PST) tcpslice 1359538435.230 1359538435.231 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 10:04:44.382 PST Gen. Time: 01/30/2013 10:04:44.514 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.134.139.54 (10:04:44.382 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (10:04:44.382 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.63.207.205 (10:04:44.514 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (10:04:44.514 PST) tcpslice 1359569084.382 1359569084.383 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 13:54:21.531 PST Gen. Time: 01/30/2013 13:54:21.671 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.194.198.114 (13:54:21.531 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 135:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (13:54:21.531 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.255.141.166 (13:54:21.671 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 135:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (13:54:21.671 PST) tcpslice 1359582861.531 1359582861.532 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 16:19:37.750 PST Gen. Time: 01/30/2013 16:19:37.915 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.65.169.89 (16:19:37.750 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:19:37.750 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.119.216.216 (16:19:37.915 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:19:37.915 PST) tcpslice 1359591577.750 1359591577.751 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 16:39:55.474 PST Gen. Time: 01/30/2013 16:39:55.637 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.123.145.153 (16:39:55.474 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:39:55.474 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.193.61.168 (16:39:55.637 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (16:39:55.637 PST) tcpslice 1359592795.474 1359592795.475 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 19:19:29.481 PST Gen. Time: 01/30/2013 19:19:29.614 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.193.19.157 (19:19:29.481 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 445:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (19:19:29.481 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.217.15.61 (19:19:29.614 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 445:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (19:19:29.614 PST) tcpslice 1359602369.481 1359602369.482 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================ Score: 1.1 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 21:34:45.149 PST Gen. Time: 01/30/2013 21:34:45.292 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) 130.146.251.37 (21:34:45.149 PST) event=777:7777005 {tcp} E5[bh] Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 135:10, [] MAC_Src: 00:30:48:30:03:AF 0->0 (21:34:45.149 PST) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.146.251.37 (21:34:45.292 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/0): 135:21, [] MAC_Src: 00:30:48:30:03:AF 0->0 (21:34:45.292 PST) tcpslice 1359610485.149 1359610485.150 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.229 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 01/30/2013 21:39:43.646 PST Gen. Time: 01/30/2013 21:39:43.646 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 130.146.251.37 (21:39:43.646 PST) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 26 IPs (26 /24s) (# pkts S/M/O/I=0/26/0/0): 135:25, 445, [] MAC_Src: 00:30:48:30:03:AF 0->0 (21:39:43.646 PST) tcpslice 1359610783.646 1359610783.647 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.229' ============================== SEPARATOR ================================