Score: 0.8 (>= 0.8) Infected Target: 192.168.1.101 Infector List: 128.18.30.247 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 08/27/2013 10:09:43.385 PDT Gen. Time: 08/27/2013 10:09:43.385 PDT INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL SRC) 128.18.30.247 (10:09:43.385 PDT) event=1:92009714 {tcp} E2[irb] ET WEB_SERVER Script tag in URI, Possible Cross Site Scripting Attempt, [/index.html?urlmaskfilter=] MAC_Dst: 00:01:64:FF:CE:EA 80<-58947 (10:09:43.385 PDT) CLIENT-INITIATED EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1377623383.385 1377623383.386 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.101' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.101 Infector List: 128.18.30.247 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 08/27/2013 10:09:43.385 PDT Gen. Time: 08/27/2013 10:16:00.413 PDT INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL SRC) 128.18.30.247 (17) (10:09:43.385 PDT) event=1:92009714 (13) {tcp} E2[irb] ET WEB_SERVER Script tag in URI, Possible Cross Site Scripting Attempt, [/index.html?urlmaskfilter=] MAC_Dst: 00:01:64:FF:CE:EA 80<-58947 (10:09:43.385 PDT) 80<-58949 (10:09:43.971 PDT) 80<-58953 (10:09:44.248 PDT) 80<-59621 (10:12:20.406 PDT) 80<-59976 (10:12:59.079 PDT) 80<-59988 (10:13:00.804 PDT) 80<-60017 (10:13:04.120 PDT) 80<-60018 (10:13:04.230 PDT) 80<-60025 (10:13:05.114 PDT) 80<-60045 (10:13:07.202 PDT) 80<-60050 (10:13:07.914 PDT) 80<-60312 (10:13:55.521 PDT) 80<-60342 (10:13:57.873 PDT) ------------------------- event=1:92016184 (4) {tcp} E2[irb] ET WEB_SERVER ColdFusion administrator access, [/CFIDE/administrator/settings/version.cfm] MAC_Dst: 00:01:64:FF:CE:EA 80<-59690 (10:12:25.077 PDT) 80<-60000 (10:13:02.652 PDT) 80<-60038 (10:13:06.503 PDT) 80<-60335 (10:13:57.392 PDT) CLIENT-INITIATED EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1377623383.385 1377623383.386 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.101' ============================== SEPARATOR ================================