Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 178.151.143.69 Peer Coord. List: Resource List: Observed Start: 02/07/2013 03:04:33.148 PST Gen. Time: 02/07/2013 03:05:24.510 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 178.151.143.69 (03:05:24.510 PST) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 80->59111 (03:05:24.510 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 178.151.143.69 (4) (03:04:33.148 PST) event=1:552123 (4) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->38459 (03:04:33.148 PST) 80->40346 (03:04:35.942 PST) 80->42059 (03:04:39.648 PST) 80->56358 (03:05:15.363 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1360235073.148 1360235073.149 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================ Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 178.151.143.69 (17) Peer Coord. List: Resource List: Observed Start: 02/07/2013 03:04:33.148 PST Gen. Time: 02/07/2013 03:10:52.465 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 178.151.143.69 (17) (03:05:24.510 PST-03:06:35.367 PST) event=1:2002033 (17) {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 9: 80->59111 (03:05:24.510 PST-03:05:24.708 PST) 8: 80->39515 (03:06:35.169 PST-03:06:35.367 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 178.151.143.69 (17) (03:04:33.148 PST) event=1:552123 (17) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->38459 (03:04:33.148 PST) 80->40346 (03:04:35.942 PST) 80->42059 (03:04:39.648 PST) 80->56358 (03:05:15.363 PST) 80->38893 (03:05:40.495 PST) 80->40818 (03:05:43.928 PST) 80->42244 (03:05:45.953 PST) 80->43500 (03:05:48.174 PST) 80->52737 (03:06:08.683 PST) 80->55665 (03:06:12.179 PST) 80->57684 (03:06:14.797 PST) 80->36134 (03:06:28.445 PST) 80->46492 (03:06:49.621 PST) 80->49164 (03:06:58.254 PST) 80->50420 (03:07:01.504 PST) 80->52478 (03:07:05.827 PST) 80->36824 (03:07:34.089 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1360235073.148 1360235195.368 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================