Score: 1.1 (>= 0.8) Infected Target: 192.168.1.100 Infector List: Egg Source List: C & C List: 199.255.189.160 Peer Coord. List: Resource List: Observed Start: 03/24/2013 19:38:00.617 PDT Gen. Time: 03/24/2013 19:40:25.951 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 199.255.189.160 (19:40:25.951 PDT) event=1:2012801 {tcp} E4[rb] ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/biz/j-and-j-drug-austin?start=0&sort_by=date_desc&rpp=40] MAC_Src: 00:21:5A:08:BB:0C 36666->80 (19:40:25.951 PDT) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port 213.249.68.98 (19:38:00.617 PDT) event=1:9920020 {udp} E8[std] ET ShadowServer confirmed botnet control server on standard port, [] MAC_Src: 00:21:5A:08:BB:0C 32834->53 (19:38:00.617 PDT) DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1364179080.617 1364179080.618 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.100' ============================== SEPARATOR ================================ Score: 1.2 (>= 0.8) Infected Target: 192.168.1.100 Infector List: Egg Source List: C & C List: 199.255.189.160 (2), 207.58.145.102 Peer Coord. List: Resource List: Observed Start: 03/24/2013 19:38:00.617 PDT Gen. Time: 03/24/2013 19:44:20.823 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 199.255.189.160 (2) (19:40:25.951 PDT) event=1:2012801 (2) {tcp} E4[rb] ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/biz/j-and-j-drug-austin?start=0&sort_by=date_desc&rpp=40] MAC_Src: 00:21:5A:08:BB:0C 36666->80 (19:40:25.951 PDT) 36666->80 (19:40:26.004 PDT) C and C TRAFFIC (RBN) 207.58.145.102 (19:42:28.543 PDT) event=1:3810008 {udp} E4[nbr] ET Known Russian Business Network Monitored Domain, [] MAC_Src: 00:21:5A:08:BB:0C 43720->53 (19:42:28.543 PDT) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port 213.249.68.98 (19:38:00.617 PDT) event=1:9920020 {udp} E8[std] ET ShadowServer confirmed botnet control server on standard port, [] MAC_Src: 00:21:5A:08:BB:0C 32834->53 (19:38:00.617 PDT) DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1364179080.617 1364179080.618 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.100' ============================== SEPARATOR ================================