Score: 0.8 (>= 0.8) Infected Target: 130.107.174.30 Infector List: 85.66.95.231 Egg Source List: 85.66.95.231 C & C List: Peer Coord. List: Resource List: Observed Start: 06/14/2008 21:28:03.253 PDT Report End: 06/14/2008 21:28:07.074 PDT Gen. Time: 06/14/2008 21:28:10.509 PDT INBOUND SCAN EXPLOIT 85.66.95.231 (10) (21:28:03.374 PDT-21:28:07.074 PDT) event=1:21390 (5) {tcp} E2[rb] REGISTERED FREE SHELLCODE x86 inc ebx NOOP 2: 139<-16039 (21:28:03.374 PDT-21:28:03.487 PDT) 139<-16071 (21:28:06.619 PDT) 2: 139<-16070 (21:28:06.257 PDT-21:28:07.074 PDT) ------------------------- event=1:299998 (5) {tcp} E2[rb] SHELLCODE x86 inc ebx NOOP 2: 139<-16070 (21:28:06.257 PDT-21:28:07.074 PDT) 2: 139<-16039 (21:28:03.374 PDT-21:28:03.487 PDT) 139<-16071 (21:28:06.619 PDT) EXPLOIT (slade) EGG DOWNLOAD 85.66.95.231 (5) (21:28:03.253 PDT) event=1:2001683 {tcp} E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host 68<-16543 (21:28:10.509 PDT) ------------------------- event=1:32000004 (3) {tcp} E3[rb] BotHunter MALWARE executable upload 139<-16039 (21:28:03.253 PDT) 139<-16070 (21:28:06.137 PDT) 139<-16071 (21:28:06.496 PDT) ------------------------- event=1:5001684 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host 68<-16543 (21:28:10.509 PDT) C and C TRAFFIC PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT tcpslice 1213504083.253 1213504087.075 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.174.30' ============================== SEPARATOR ================================