Score: 1.3 (>= 0.8) Infected Target: 192.168.1.234 Infector List: Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 06/18/2013 11:11:57.957 PDT Gen. Time: 06/18/2013 12:34:35.138 PDT INBOUND SCAN EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD C and C TRAFFIC C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN 192.47.243.68 (17) (11:11:57.957 PDT-11:12:09.465 PDT) event=1:2001219 (2) {tcp} E5[rb] ET SCAN Potential SSH Scan (20 in 60 secs), [] MAC_Src: 00:21:1C:EE:14:00 4814->22 (11:12:09.465 PDT) 67->22 (11:12:26.056 PDT) ------------------------- event=1:2001569 {tcp} E5[rb] ET SCAN Behavioral Unusual Port NETBIOS traffic, Potential Scan or Infection (60 in 60 secs), [] MAC_Src: 00:21:1C:EE:14:00 20->139 (11:12:23.035 PDT) ------------------------- event=1:2002910 {tcp} E5[rb] ET SCAN Potential VNC Scan 5800-5820, [] MAC_Src: 00:01:64:FF:CE:EA 26132->5802 (11:14:16.557 PDT) ------------------------- event=1:2002992 {tcp} E5[rb] ET SCAN Rapid POP3 Connections - Possible Brute Force Attack, [] MAC_Src: 00:01:64:FF:CE:EA 20->110 (11:12:21.515 PDT) ------------------------- event=1:2002994 {tcp} E5[rb] ET SCAN Rapid IMAP Connections - Possible Brute Force Attack, [] MAC_Src: 00:21:1C:EE:14:00 20->143 (11:12:21.666 PDT) ------------------------- event=1:2003068 (11) {tcp} E5[rb] ET SCAN Potential SSH Scan OUTBOUND, [] MAC_Src: 00:01:64:FF:CE:EA 21->22 (11:12:17.835 PDT) 20->22 (11:12:20.496 PDT) 3755->22 (11:12:03.705 PDT) 53->22 (11:12:23.308 PDT) 25769->22 (11:14:04.198 PDT) 67->22 (11:12:26.056 PDT) 2: 4814->22 (11:12:09.465 PDT-11:12:09.465 PDT) 1034->22 (11:12:31.316 PDT) 4585->22 (11:11:57.957 PDT) 34561->22 (11:12:33.976 PDT) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT Local Threat Triggered DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN 192.47.243.231 (12:34:35.138 PDT) event=777:7777008 {tcp} E8[bh] Detected intense malware port scanning of 33 IPs (1 /24s) (# pkts S/M/O/I=98/635/0/0): 139:33, 1433:33, 2100:33, 3127:33, 22:32, 136:32, 138:32, 445:32, 559:32, 2067:32, 3306:32, 4445:32, 5554:32, 9996:32, 137:31, 6129:31, 10000:31, 1025:30, 5000:30, 27374:30, [] MAC_Src: 00:01:64:FF:CE:EA 0->0 (12:34:35.138 PDT) tcpslice 1371579117.957 1371579129.466 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.234' ============================== SEPARATOR ================================