Score: 1.3 (>= 0.8) Infected Target: 192.168.1.234 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 06/11/2013 11:08:55.670 PDT Gen. Time: 06/11/2013 13:59:13.715 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 192.47.243.236 (2) (11:10:07.842 PDT) event=1:2003068 (2) {tcp} E5[rb] ET SCAN Potential SSH Scan OUTBOUND, [] MAC_Src: 00:01:64:FF:CE:EA 25341->22 (11:10:07.842 PDT) 3900->22 (11:10:07.988 PDT) 192.47.243.184 (15) (11:08:55.670 PDT) event=1:2001219 (2) {tcp} E5[rb] ET SCAN Potential SSH Scan (20 in 60 secs), [] MAC_Src: 00:21:1C:EE:14:00 2839->22 (11:09:07.288 PDT) 67->22 (11:09:23.206 PDT) ------------------------- event=1:2001569 {tcp} E5[rb] ET SCAN Behavioral Unusual Port NETBIOS traffic, Potential Scan or Infection (60 in 60 secs), [] MAC_Src: 00:21:1C:EE:14:00 20->139 (11:09:20.416 PDT) ------------------------- event=1:2002992 {tcp} E5[rb] ET SCAN Rapid POP3 Connections - Possible Brute Force Attack, [] MAC_Src: 00:21:1C:EE:14:00 20->110 (11:09:19.017 PDT) ------------------------- event=1:2002994 {tcp} E5[rb] ET SCAN Rapid IMAP Connections - Possible Brute Force Attack, [] MAC_Src: 00:21:1C:EE:14:00 20->143 (11:09:19.157 PDT) ------------------------- event=1:2003068 (10) {tcp} E5[rb] ET SCAN Potential SSH Scan OUTBOUND, [] MAC_Src: 00:01:64:FF:CE:EA 4610->22 (11:08:55.670 PDT) 2439->22 (11:09:01.446 PDT) 2839->22 (11:09:07.288 PDT) 2839->22 (11:09:07.288 PDT) 21->22 (11:09:15.536 PDT) 20->22 (11:09:18.106 PDT) 53->22 (11:09:20.657 PDT) 67->22 (11:09:23.206 PDT) 1034->22 (11:09:28.427 PDT) 34561->22 (11:09:31.007 PDT) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT Local Threat Triggered DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 192.47.243.205 (13:59:13.715 PDT) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 35 IPs (1 /24s) (# pkts S/M/O/I=97/642/0/0): 22:33, 139:33, 445:33, 4445:33, 6129:33, 9996:33, 136:32, 137:32, 559:32, 1025:32, 1433:32, 2067:32, 2100:32, 3127:32, 10000:32, 138:31, 3306:31, 5000:31, 5554:31, 27374:31, 4347, [] MAC_Src: 00:01:64:FF:CE:EA 0->0 (13:59:13.715 PDT) tcpslice 1370974135.670 1370974135.671 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.234' ============================== SEPARATOR ================================