Score: 0.8 (>= 0.8) Infected Target: 192.168.1.172 Infector List: 130.193.165.42 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 05/22/2013 04:43:38.803 PDT Gen. Time: 05/22/2013 04:43:40.273 PDT INBOUND SCAN EXPLOIT 130.193.165.42 (04:43:38.803 PDT) event=1:22351 {tcp} E2[rb] REGISTERED FREE NETBIOS DCERPC ISystemActivator path overflow attempt little endian unicode, [] MAC_Dst: 00:30:48:30:03:AE 135<-61244 (04:43:38.803 PDT) EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 130.193.165.42 (04:43:40.273 PDT) event=1:552123 {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:30:48:30:03:AF 1130->34521 (04:43:40.273 PDT) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT Local Threat Triggered DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1369223018.803 1369223018.804 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.172' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.172 Infector List: 67.0.65.67 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 05/22/2013 18:24:48.481 PDT Gen. Time: 05/22/2013 18:24:51.334 PDT INBOUND SCAN EXPLOIT 67.0.65.67 (2) (18:24:48.481 PDT) event=1:22514 (2) {tcp} E2[rb] GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt, [] MAC_Dst: 00:30:48:30:03:AE 445<-1323 (18:24:48.481 PDT) 445<-1328 (18:24:50.082 PDT) EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 67.0.65.67 (18:24:51.334 PDT) event=1:552123 {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 00:30:48:30:03:AE 1022->1334 (18:24:51.334 PDT) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT Local Threat Triggered DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1369272288.481 1369272288.482 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.172' ============================== SEPARATOR ================================