Score: 1.3 (>= 0.8) Infected Target: 130.107.238.234 Infector List: 190.68.189.26 Egg Source List: 210.51.51.150 C & C List: 121.12.116.142 Peer Coord. List: Resource List: Observed Start: 06/18/2009 06:17:54.002 PDT Report End: 06/18/2009 06:18:21.356 PDT Gen. Time: 06/18/2009 06:18:51.496 PDT INBOUND SCAN EXPLOIT 190.68.189.26 (06:17:54.002 PDT) event=1:22466 {tcp} E2[rb] NETBIOS SMB-DS IPC$ unicode share access 445<-3997 (06:17:54.002 PDT) EXPLOIT (slade) EGG DOWNLOAD 210.51.51.150 (7) (06:18:08.906 PDT-06:18:21.356 PDT) event=1:2001683 (4) {tcp} E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host 3: 1198<-88 (06:18:15.567 PDT-06:18:21.356 PDT) 1181<-88 (06:18:08.906 PDT) ------------------------- event=1:5001684 (3) {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host 1181<-88 (06:18:08.906 PDT) 2: 1198<-88 (06:18:16.339 PDT-06:18:21.356 PDT) C and C TRAFFIC 121.12.116.142 (06:18:01.760 PDT) event=1:2003603 {tcp} E4[rb] ET TROJAN W32.Virut.A joining an IRC Channel 1175->65520 (06:18:01.760 PDT) PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT tcpslice 1245331074.002 1245331101.357 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.238.234' ============================== SEPARATOR ================================