Score: 1.0 (>= 0.8) Infected Target: 192.168.1.85 Infector List: Egg Source List: C & C List: 66.249.74.230 Peer Coord. List: Resource List: Observed Start: 11/04/2013 10:54:15.369 PST Gen. Time: 11/04/2013 10:57:10.152 PST INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL) EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC 66.249.74.230 (10:57:10.152 PST) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->37684 (10:57:10.152 PST) C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND ATTACK 66.249.74.230 (3) (10:54:15.369 PST) event=1:552123 (3) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->55937 (10:54:15.369 PST) 80->52496 (10:54:36.897 PST) 80->37684 (10:57:10.128 PST) OUTBOUND ATTACK (INTERNAL) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1383591255.369 1383591255.370 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.85' ============================== SEPARATOR ================================ Score: 1.0 (>= 0.8) Infected Target: 192.168.1.85 Infector List: Egg Source List: C & C List: 66.249.74.230 Peer Coord. List: Resource List: Observed Start: 11/04/2013 10:54:15.369 PST Gen. Time: 11/04/2013 11:13:57.150 PST INBOUND SCAN EXPLOIT EXPLOIT (INTERNAL) EXPLOIT MALWARE DNS EGG DOWNLOAD EGG DOWNLOAD (INTERNAL) C and C TRAFFIC 66.249.74.230 (10:57:10.152 PST) event=1:2002033 {tcp} E4[rb] ET TROJAN BOT - potential response, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->37684 (10:57:10.152 PST) C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND ATTACK 66.249.74.230 (6) (10:54:15.369 PST) event=1:552123 (6) {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->55937 (10:54:15.369 PST) 80->52496 (10:54:36.897 PST) 80->37684 (10:57:10.128 PST) 80->34634 (11:06:12.371 PST) 80->45760 (11:07:15.775 PST) 80->52961 (11:09:54.957 PST) 100.43.83.137 (10:58:57.169 PST) event=1:552123 {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->27469 (10:58:57.169 PST) 109.168.98.27 (11:02:59.405 PST) event=1:552123 {tcp} E5[rb] REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner, [] MAC_Src: 1C:DF:0F:66:3D:B0 80->20702 (11:02:59.405 PST) OUTBOUND ATTACK (INTERNAL) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1383591255.369 1383591255.370 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.85' ============================== SEPARATOR ================================ Score: 0.8 (>= 0.8) Infected Target: 192.168.1.85 Infector List: 112.25.21.7 Egg Source List: 112.25.21.7 C & C List: Peer Coord. List: Resource List: Observed Start: 11/04/2013 13:22:50.239 PST Gen. Time: 11/04/2013 13:22:51.125 PST INBOUND SCAN EXPLOIT 112.25.21.7 (13:22:50.239 PST) event=1:22009200 {tcp} E2[rb] ET CURRENT_EVENTS Conficker.a Shellcode, [] MAC_Dst: 00:30:48:30:03:AE 445<-1525 (13:22:50.239 PST) EXPLOIT (INTERNAL) EXPLOIT MALWARE DNS EGG DOWNLOAD 112.25.21.7 (13:22:51.125 PST) event=1:2001685 {tcp} E3[rb] ET MALWARE Possible Windows executable sent when remote host claims to send an image, [] MAC_Src: 00:21:1C:EE:14:00 1028<-5931 (13:22:51.125 PST) EGG DOWNLOAD (INTERNAL) C and C TRAFFIC C and C TRAFFIC (INTERNAL) C and C TRAFFIC (RBN) C and C DNS CHECK-IN OUTBOUND SKYPE CANDIDATE OUTBOUND SCAN (spp) OUTBOUND ATTACK OUTBOUND ATTACK (INTERNAL) ATTACK PREP PEER COORDINATION Info PEER COORDINATION DECLARE BOT Standard Port DECLARE BOT Non-standard Port DECLARE BOT OUTBOUND INTENSE MALWARE PORT SCAN tcpslice 1383600170.239 1383600170.240 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.85' ============================== SEPARATOR ================================