Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 78.30.200.81 Peer Coord. List: Resource List: Observed Start: 03/06/2013 10:35:26.005 PST Gen. Time: 03/06/2013 10:36:15.617 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 78.30.200.81 (10:36:15.617 PST) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 80->48164 (10:36:15.617 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 78.30.200.81 (7) (10:35:26.005 PST) event=1:552123 (7) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->56171 (10:35:26.005 PST) 80->59505 (10:35:34.085 PST) 80->60396 (10:35:36.174 PST) 80->36902 (10:35:47.583 PST) 80->37905 (10:35:49.978 PST) 80->38802 (10:35:52.165 PST) 80->46308 (10:36:10.325 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1362594926.005 1362594926.006 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================ Score: 1.0 (>= 0.8) Infected Target: 192.168.1.14 Infector List: Egg Source List: C & C List: 78.30.200.81 (17) Peer Coord. List: Resource List: Observed Start: 03/06/2013 10:35:26.005 PST Gen. Time: 03/06/2013 10:41:40.658 PST INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 78.30.200.81 (17) (10:36:15.617 PST-10:36:15.820 PST) event=1:2002033 (17) {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 17: 80->48164 (10:36:15.617 PST-10:36:15.820 PST) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 78.30.200.81 (17) (10:35:26.005 PST) event=1:552123 (17) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->56171 (10:35:26.005 PST) 80->59505 (10:35:34.085 PST) 80->60396 (10:35:36.174 PST) 80->36902 (10:35:47.583 PST) 80->37905 (10:35:49.978 PST) 80->38802 (10:35:52.165 PST) 80->46308 (10:36:10.325 PST) 80->53231 (10:36:26.476 PST) 80->54086 (10:36:28.504 PST) 80->58231 (10:36:38.361 PST) 80->59095 (10:36:40.441 PST) 80->59931 (10:36:42.511 PST) 80->35741 (10:36:52.353 PST) 80->42858 (10:37:09.131 PST) 80->43755 (10:37:11.263 PST) 80->47814 (10:37:20.808 PST) 80->48704 (10:37:22.970 PST) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1362594926.005 1362594975.821 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================