Score: 1.0 (>= 0.8) Infected Target: 192.168.1.85 Infector List: Egg Source List: C & C List: 157.55.33.77 Peer Coord. List: Resource List: Observed Start: 03/10/2013 15:53:17.165 PDT Gen. Time: 03/10/2013 15:53:24.026 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 157.55.33.77 (15:53:24.026 PDT) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 80->62727 (15:53:24.026 PDT) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 157.55.33.77 (3) (15:53:17.165 PDT) event=1:552123 (3) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->28205 (15:53:17.165 PDT) 80->43543 (15:53:21.005 PDT) 80->18863 (15:53:22.657 PDT) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1362955997.165 1362955997.166 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.85' ============================== SEPARATOR ================================ Score: 1.0 (>= 0.8) Infected Target: 192.168.1.85 Infector List: Egg Source List: C & C List: 157.55.33.77 Peer Coord. List: Resource List: Observed Start: 03/10/2013 15:53:17.165 PDT Gen. Time: 03/10/2013 15:54:09.002 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 157.55.33.77 (15:53:24.026 PDT) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 00:01:64:FF:CE:EA 80->62727 (15:53:24.026 PDT) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 157.55.33.77 (11) (15:53:17.165 PDT) event=1:552123 (11) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->28205 (15:53:17.165 PDT) 80->43543 (15:53:21.005 PDT) 80->18863 (15:53:22.657 PDT) 80->38541 (15:53:25.580 PDT) 80->49251 (15:53:29.817 PDT) 80->49258 (15:53:29.840 PDT) 80->49725 (15:53:30.732 PDT) 80->64408 (15:53:32.008 PDT) 80->56486 (15:53:33.276 PDT) 80->62049 (15:53:35.866 PDT) 80->63663 (15:53:36.872 PDT) 65.55.52.94 (6) (15:53:25.215 PDT) event=1:552123 (6) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:01:64:FF:CE:EA 80->58843 (15:53:25.215 PDT) 80->39241 (15:53:27.224 PDT) 80->64084 (15:53:29.171 PDT) 80->60039 (15:53:29.202 PDT) 80->42936 (15:53:35.186 PDT) 80->24854 (15:53:36.541 PDT) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1362955997.165 1362955997.166 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.85' ============================== SEPARATOR ================================