Score: 0.8 (>= 0.8) Infected Target: 192.168.1.14 Infector List: 66.249.73.162 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 10/24/2013 01:35:36.283 PDT Gen. Time: 10/24/2013 01:37:42.951 PDT INBOUND SCAN EXPLOIT 66.249.73.162 (01:37:42.951 PDT) event=1:2001343 {tcp} E2[rb] ET WEB_SERVER IIS ASP.net Auth Bypass / Canonicalization % 5 C, [/popups/cc_servers/07-23-2011/http:/www.godaddy.com/email/email-hosting.aspx?isc=gppt02C035&domain=blogtaletadio.com/] MAC_Dst: 1C:DF:0F:66:3D:B0 80<-64801 (01:37:42.951 PDT) EXPLOIT (INTERNAL) EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND ATTACK 66.249.73.162 (01:35:36.283 PDT) event=1:552123 {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->54240 (01:35:36.283 PDT) OUTBOUND ATTACK (INTERNAL) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1382603736.283 1382603736.284 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.14 Infector List: 66.249.74.38 Egg Source List: C & C List: Peer Coord. List: Resource List: Observed Start: 10/24/2013 06:25:00.034 PDT Gen. Time: 10/24/2013 06:26:52.978 PDT INBOUND SCAN EXPLOIT 66.249.74.38 (06:26:52.978 PDT) event=1:2001343 {tcp} E2[rb] ET WEB_SERVER IIS ASP.net Auth Bypass / Canonicalization % 5 C, [/popups/cc_servers/07-23-2011/http:/www.godaddy.com/hosting/website-builder.aspx?isc=gppt02C010&domain=blogtaletadio.com/] MAC_Dst: 1C:DF:0F:66:3D:B0 80<-65028 (06:26:52.978 PDT) EXPLOIT (INTERNAL) EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND ATTACK 2.201.206.202 (2) (06:25:00.034 PDT) event=1:552123 (2) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->58288 (06:25:00.034 PDT) 80->58289 (06:25:25.000 PDT) OUTBOUND ATTACK (INTERNAL) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1382621100.034 1382621100.035 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.14' ============================== SEPARATOR ================================