Score: 0.8 (>= 0.8) Infected Target: 192.168.1.127 Infector List: 88.26.230.102 Egg Source List: C & C List: 149.20.56.32 Peer Coord. List: Resource List: Observed Start: 02/19/2013 13:14:39.140 PST Gen. Time: 02/19/2013 13:14:52.432 PST INBOUND SCAN EXPLOIT 88.26.230.102 (13:14:39.140 PST) event=1:22009201 {tcp} E2[rb] ET TROJAN Conficker.b Shellcode, [] MAC_Dst: 00:30:48:30:03:AE 445<-1328 (13:14:39.140 PST) EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 149.20.56.32 (13:14:52.432 PST) event=1:2009114 {tcp} E4[rb] ET TROJAN Downadup/Conficker A Worm reporting, [/search?q=0&aq=7] MAC_Src: 00:30:48:30:03:AE 1026->80 (13:14:52.432 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1361308479.140 1361308479.141 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.127' ============================== SEPARATOR ================================ Score: 1.3 (>= 0.8) Infected Target: 192.168.1.127 Infector List: 88.26.230.102 Egg Source List: 204.152.184.139 C & C List: 149.20.56.32 (17) Peer Coord. List: Resource List: Observed Start: 02/19/2013 13:14:39.140 PST Gen. Time: 02/19/2013 13:17:52.703 PST INBOUND SCAN EXPLOIT 88.26.230.102 (13:14:39.140 PST) event=1:22009201 {tcp} E2[rb] ET TROJAN Conficker.b Shellcode, [] MAC_Dst: 00:30:48:30:03:AE 445<-1328 (13:14:39.140 PST) EXPLOIT MALWARE DNS EGG DOWNLOAD 204.152.184.139 (13:14:57.159 PST) event=1:3300003 {tcp} E3[rb] BotHunter HTTP-based .exe Upload on backdoor port, [] MAC_Src: 00:30:48:30:03:AF 1031->80 (13:14:57.159 PST) C and C TRAFFIC 149.20.56.32 (17) (13:14:52.432 PST) event=1:2009024 (8) {tcp} E4[rb] ET TROJAN Downadup/Conficker A or B Worm reporting, [] MAC_Src: 00:30:48:30:03:AE 1026->80 (13:14:52.432 PST) 1027->80 (13:14:52.432 PST) 1028->80 (13:14:52.442 PST) 1029->80 (13:14:52.443 PST) 1042->80 (13:14:59.907 PST) 1043->80 (13:14:59.908 PST) 1058->80 (13:15:07.217 PST) 1059->80 (13:15:07.218 PST) ------------------------- event=1:2009114 (9) {tcp} E4[rb] ET TROJAN Downadup/Conficker A Worm reporting, [/search?q=0&aq=7] MAC_Src: 00:30:48:30:03:AE 1026->80 (13:14:52.432 PST) 1027->80 (13:14:52.432 PST) 1028->80 (13:14:52.442 PST) 1029->80 (13:14:52.443 PST) 1042->80 (13:14:59.907 PST) 1043->80 (13:14:59.908 PST) 1058->80 (13:15:07.217 PST) 1059->80 (13:15:07.218 PST) 1060->80 (13:15:07.230 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1361308479.140 1361308479.141 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.127' ============================== SEPARATOR ================================