Score: 0.8 (>= 0.8) Infected Target: 192.168.1.104 Infector List: 128.18.30.247 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 08/27/2013 08:46:46.748 PDT Gen. Time: 08/27/2013 08:46:46.748 PDT INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL SRC) 128.18.30.247 (08:46:46.748 PDT) event=1:92009714 {tcp} E2[irb] ET WEB_SERVER Script tag in URI, Possible Cross Site Scripting Attempt, [/index.html?urlmaskfilter=] MAC_Dst: 00:01:64:FF:CE:EA 80<-36306 (08:46:46.748 PDT) CLIENT-INITIATED EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1377618406.748 1377618406.749 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.104' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.104 Infector List: 128.18.30.247 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 08/27/2013 08:46:46.748 PDT Gen. Time: 08/27/2013 08:53:24.843 PDT INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL SRC) 128.18.30.247 (17) (08:46:46.748 PDT) event=1:92009714 (13) {tcp} E2[irb] ET WEB_SERVER Script tag in URI, Possible Cross Site Scripting Attempt, [/index.html?urlmaskfilter=] MAC_Dst: 00:01:64:FF:CE:EA 80<-36306 (08:46:46.748 PDT) 80<-36313 (08:46:46.770 PDT) 80<-36316 (08:46:46.784 PDT) 80<-37065 (08:48:55.612 PDT) 80<-37269 (08:49:16.205 PDT) 80<-37278 (08:49:16.285 PDT) 80<-37295 (08:49:16.498 PDT) 80<-37295 (08:49:16.502 PDT) 80<-37300 (08:49:16.536 PDT) 80<-37312 (08:49:16.623 PDT) 80<-37316 (08:49:16.652 PDT) 80<-37562 (08:49:23.235 PDT) 80<-37620 (08:49:23.566 PDT) ------------------------- event=1:92016184 (4) {tcp} E2[irb] ET WEB_SERVER ColdFusion administrator access, [/CFIDE/administrator/settings/version.cfm] MAC_Dst: 00:01:64:FF:CE:EA 80<-37111 (08:48:55.812 PDT) 80<-37287 (08:49:16.410 PDT) 80<-37308 (08:49:16.595 PDT) 80<-37618 (08:49:23.522 PDT) CLIENT-INITIATED EXPLOIT EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND SCAN ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1377618406.748 1377618406.749 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.104' ============================== SEPARATOR ================================