Score: 1.3 (>= 0.8) Infected Target: 130.107.130.64 Infector List: 110.10.253.79 Egg Source List: 110.10.253.79 C & C List: 221.5.74.39 Peer Coord. List: Resource List: Observed Start: 06/26/2009 05:39:09.281 PDT Report End: 06/26/2009 05:39:12.322 PDT Gen. Time: 06/26/2009 05:41:23.925 PDT INBOUND SCAN EXPLOIT 110.10.253.79 (5) (05:39:09.281 PDT-05:39:12.322 PDT) event=1:2003081 (2) {tcp} E2[rb] ET EXPLOIT NETBIOS SMB DCERPC NetrpPathCanonicalize request (possible MS06-040) 2: 139<-2485 (05:39:09.281 PDT-05:39:09.656 PDT) ------------------------- event=1:299913 (3) {tcp} E2[rb] SHELLCODE x86 0x90 unicode NOOP 139<-2578 (05:39:15.322 PDT) 2: 139<-2529 (05:39:12.322 PDT-05:39:12.322 PDT) EXPLOIT (slade) EGG DOWNLOAD 110.10.253.79 (2) (05:39:24.011 PDT) event=1:2001683 {tcp} E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host 9988<-2699 (05:39:24.011 PDT) ------------------------- event=1:5001684 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host 9988<-2699 (05:39:24.011 PDT) C and C TRAFFIC 221.5.74.39 (05:39:26.640 PDT) event=1:2003603 {tcp} E4[rb] ET TROJAN W32.Virut.A joining an IRC Channel 1031->65520 (05:39:26.640 PDT) PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT tcpslice 1246019949.281 1246019952.323 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.130.64' ============================== SEPARATOR ================================