Score: 1.1 (>= 0.8) Infected Target: 192.168.1.102 Infector List: Egg Source List: C & C List: 198.51.132.60 Peer Coord. List: Resource List: Observed Start: 04/23/2013 12:50:52.782 PDT Gen. Time: 04/23/2013 12:53:08.211 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC 198.51.132.60 (12:50:52.782 PDT) event=1:2012801 {tcp} E4[rb] ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/user_details_thanx?userid=7s8_jBikLQtKrauzhv79HQ&thanx_start=0] MAC_Src: 00:21:5A:08:EC:40 35189->80 (12:50:52.782 PDT) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port 213.249.68.98 (12:53:08.211 PDT) event=1:9920020 {udp} E8[std] ET ShadowServer confirmed botnet control server on standard port, [] MAC_Src: 00:21:5A:08:EC:40 51297->53 (12:53:08.211 PDT) DECLARE BOT Non-standard Port DECLARE BOT Local Threat Triggered DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1366746652.782 1366746652.783 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.102' ============================== SEPARATOR ================================