Score: 1.8 (>= 0.8) Infected Target: 192.168.1.192 Infector List: 117.254.19.146 Egg Source List: 117.254.19.146 C & C List: 66.252.13.212 (7) Peer Coord. List: Resource List: 66.252.13.212 Observed Start: 09/24/2009 23:14:03.840 PDT Report End: 09/24/2009 23:14:03.920 PDT Gen. Time: 09/24/2009 23:18:05.483 PDT INBOUND SCAN EXPLOIT 117.254.19.146 (4) (23:14:03.840 PDT-23:14:03.920 PDT) event=1:21390 (2) {tcp} E2[rb] REGISTERED FREE SHELLCODE x86 inc ebx NOOP 2: 445<-9018 (23:14:03.840 PDT-23:14:03.920 PDT) ------------------------- event=1:299998 (2) {tcp} E2[rb] SHELLCODE x86 inc ebx NOOP 2: 445<-9018 (23:14:03.840 PDT-23:14:03.920 PDT) EXPLOIT (slade) EGG DOWNLOAD 117.254.19.146 (2) (23:14:05.333 PDT) event=1:2000427 {tcp} E3[rb] ET POLICY PE EXE Install Windows file download 73<-9791 (23:14:12.773 PDT) ------------------------- event=1:2007726 {tcp} E3[rb] ET ATTACK RESPONSE Unusual FTP Server Banner on High Port (StnyFtpd) 1032<-35751 (23:14:05.333 PDT) C and C TRAFFIC 66.252.13.212 (7) (23:16:03.993 PDT) event=1:2000346 {tcp} E4[rb] ET ATTACK RESPONSE IRC - Name response on non-std port 1040<-16667 (23:18:05.483 PDT) ------------------------- event=1:2000355 {tcp} E4[rb] ET POLICY IRC authorization message 1040<-16667 (23:18:01.956 PDT) ------------------------- event=1:2001184 {tcp} E4[rb] BLEEDING-EDGE WORM RXBOT / rbOT Vulnerability Scan 1040<-16667 (23:18:02.813 PDT) ------------------------- event=1:2406000 (2) {tcp} E4[rb] ET rbN Known Russian Business Network Traffic - Hosting Nets 1034<-16667 (23:16:03.993 PDT) 1040<-16667 (23:18:01.839 PDT) ------------------------- event=1:2406019 (2) {tcp} E4[rb] ET RBN Known Russian Business Network Monitored Domains (15) 1034<-16667 (23:16:03.993 PDT) 1040<-16667 (23:18:01.839 PDT) PEER COORDINATION OUTBOUND SCAN ATTACK PREP 66.252.13.212 (23:18:02.271 PDT) event=1:2000352 {tcp} E6[rb] ET ATTACK RESPONSE IRC - dns request on non-std port 1040->16667 (23:18:02.271 PDT) DECLARE BOT tcpslice 1253859243.840 1253859243.921 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 192.168.1.192' ============================== SEPARATOR ================================