Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 94.23.23.127 Peer Coord. List: Resource List: Observed Start: 02/03/2013 17:19:00.137 PST Gen. Time: 02/03/2013 17:20:03.631 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 94.23.23.127 (17:20:03.631 PST) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 80->52175 (17:20:03.631 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 94.23.23.127 (7) (17:19:00.137 PST) event=1:552123 (7) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->48222 (17:19:00.137 PST) 80->52497 (17:19:09.299 PST) 80->53861 (17:19:12.600 PST) 80->40097 (17:19:38.340 PST) 80->43462 (17:19:45.475 PST) 80->44931 (17:19:48.249 PST) 80->49855 (17:19:58.468 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1359940740.137 1359940740.138 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================ Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 94.23.23.127 (17) Peer Coord. List: Resource List: Observed Start: 02/03/2013 17:19:00.137 PST Gen. Time: 02/03/2013 17:27:43.767 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 94.23.23.127 (17) (17:20:03.631 PST-17:22:46.917 PST) event=1:2002033 (17) {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 9: 80->52175 (17:20:03.631 PST-17:20:03.776 PST) 8: 80->54114 (17:22:46.916 PST-17:22:46.917 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 94.23.23.127 (17) (17:19:00.137 PST) event=1:552123 (17) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->48222 (17:19:00.137 PST) 80->52497 (17:19:09.299 PST) 80->53861 (17:19:12.600 PST) 80->40097 (17:19:38.340 PST) 80->43462 (17:19:45.475 PST) 80->44931 (17:19:48.249 PST) 80->49855 (17:19:58.468 PST) 80->60160 (17:20:18.631 PST) 80->33262 (17:20:21.916 PST) 80->56987 (17:21:09.962 PST) 80->58505 (17:21:43.213 PST) 80->47235 (17:22:34.754 PST) 80->59697 (17:23:04.423 PST) 80->35050 (17:23:06.807 PST) 80->40441 (17:23:19.227 PST) 80->42032 (17:23:21.811 PST) 80->43619 (17:23:25.061 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1359940740.137 1359940966.918 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================