Score: 0.8 (>= 0.8) Infected Target: 192.168.1.100 Infector List: Egg Source List: C & C List: Peer Coord. List: 137.132.80.106 (2), 137.132.80.105, 128.10.19.53 (2), 136.159.220.40, 149.43.80.20, 137.165.1.113, 133.15.59.1, 128.6.192.156, 202.249.37.67 (4), 128.223.8.113, 195.113.161.83 (2) Resource List: Observed Start: 02/23/2013 03:20:50.313 PST Gen. Time: 02/23/2013 03:23:21.792 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info 137.132.80.106 (2) (03:20:50.953 PST-03:20:57.778 PST) event=1:2000357 (2) {tcp} E7[info] ET P2P BitTorrent Traffic, [] MAC_Src: 00:21:5A:08:BB:0C 2: 2706->40542 (03:20:50.953 PST-03:20:57.778 PST) 137.132.80.105 (03:21:00.720 PST) event=1:2000357 {tcp} E7[info] ET P2P BitTorrent Traffic, [] MAC_Src: 00:21:5A:08:BB:0C 2706->33289 (03:21:00.720 PST) 128.10.19.53 (2) (03:20:50.313 PST-03:20:50.633 PST) event=1:2000357 (2) {tcp} E7[info] ET P2P BitTorrent Traffic, [] MAC_Src: 00:21:5A:08:BB:0C 2: 42466->2706 (03:20:50.313 PST-03:20:50.633 PST) 136.159.220.40 (03:20:57.503 PST) event=1:2000334 {tcp} E7[info] ET P2P BitTorrent peer sync, [] MAC_Src: 00:21:5A:08:BB:0C 49622->2706 (03:20:57.503 PST) 149.43.80.20 (03:21:00.130 PST) event=1:2000334 {tcp} E7[info] ET P2P BitTorrent peer sync, [] MAC_Src: 00:21:5A:08:BB:0C 2706->40411 (03:21:00.130 PST) 137.165.1.113 (03:20:57.527 PST) event=1:2000334 {tcp} E7[info] ET P2P BitTorrent peer sync, [] MAC_Src: 00:21:5A:08:BB:0C 2706->57672 (03:20:57.527 PST) 133.15.59.1 (03:20:50.814 PST) event=1:2000334 {tcp} E7[info] ET P2P BitTorrent peer sync, [] MAC_Src: 00:21:5A:08:BB:0C 2706->36344 (03:20:50.814 PST) 128.6.192.156 (03:20:55.671 PST) event=1:2000334 {tcp} E7[info] ET P2P BitTorrent peer sync, [] MAC_Src: 00:21:5A:08:BB:0C 58031->2706 (03:20:55.671 PST) 202.249.37.67 (4) (03:20:53.136 PST-03:20:59.188 PST) event=1:2000357 (4) {tcp} E7[info] ET P2P BitTorrent Traffic, [] MAC_Src: 00:21:5A:08:BB:0C 4: 35090->2705 (03:20:53.136 PST-03:20:59.188 PST) 128.223.8.113 (03:20:58.377 PST) event=1:2000334 {tcp} E7[info] ET P2P BitTorrent peer sync, [] MAC_Src: 00:21:5A:08:BB:0C 2706->35287 (03:20:58.377 PST) 195.113.161.83 (2) (03:20:53.519 PST-03:20:54.422 PST) event=1:2000357 (2) {tcp} E7[info] ET P2P BitTorrent Traffic, [] MAC_Src: 00:21:5A:08:BB:0C 2: 37897->2706 (03:20:53.519 PST-03:20:54.422 PST) PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port 8.5.1.45 (03:23:21.792 PST) event=1:9930009 {tcp} E8[unk] ET ShadowServer confirmed botnet control server on non-standard port, [] MAC_Src: 00:21:5A:08:BB:0C 51603->49302 (03:23:21.792 PST) DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1361618450.313 1361618459.189 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.100' ============================== SEPARATOR ================================