Score: 0.8 (>= 0.8) Infected Target: 192.168.1.221 Infector List: 128.18.30.16 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 10/22/2013 09:12:10.226 PDT Gen. Time: 10/22/2013 09:12:10.226 PDT INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL) 128.18.30.16 (09:12:10.226 PDT) event=1:92009714 {tcp} E2[irb] ET WEB_SERVER Script tag in URI, Possible Cross Site Scripting Attempt, [/servlet/webacc?User.lang=] MAC_Dst: 1C:DF:0F:66:3D:B0 80<-33076 (09:12:10.226 PDT) EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND ATTACK OUTBOUND ATTACK (INTERNAL) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1382458330.226 1382458330.227 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.221' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.221 Infector List: 128.18.30.16 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 10/22/2013 09:12:10.226 PDT Gen. Time: 10/22/2013 09:19:28.977 PDT INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL) 128.18.30.16 (17) (09:12:10.226 PDT) event=1:92009714 (13) {tcp} E2[irb] ET WEB_SERVER Script tag in URI, Possible Cross Site Scripting Attempt, [/servlet/webacc?User.lang=] MAC_Dst: 1C:DF:0F:66:3D:B0 80<-33076 (09:12:10.226 PDT) 80<-33077 (09:12:10.232 PDT) 80<-33078 (09:12:10.236 PDT) 80<-33216 (09:12:19.152 PDT) 80<-33391 (09:15:09.950 PDT) 80<-33400 (09:15:11.163 PDT) 80<-33402 (09:15:11.304 PDT) 80<-33404 (09:15:11.447 PDT) 80<-33408 (09:15:11.738 PDT) 80<-33410 (09:15:12.112 PDT) 80<-33411 (09:15:12.128 PDT) 80<-33469 (09:15:22.877 PDT) 80<-33483 (09:15:24.247 PDT) ------------------------- event=1:92016184 (4) {tcp} E2[irb] ET WEB_SERVER ColdFusion administrator access, [/CFIDE/administrator/settings/version.cfm] MAC_Dst: 1C:DF:0F:66:3D:B0 80<-33220 (09:12:19.172 PDT) 80<-33389 (09:15:09.811 PDT) 80<-33398 (09:15:10.704 PDT) 80<-33439 (09:15:17.971 PDT) EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND ATTACK OUTBOUND ATTACK (INTERNAL) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1382458330.226 1382458330.227 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.221' ============================== SEPARATOR ================================