Score: 0.8 (>= 0.8) Infected Target: 130.107.202.248 Infector List: 116.24.228.186 Egg Source List: 116.24.228.186, 193.74.22.160 C & C List: Peer Coord. List: Resource List: Observed Start: 07/02/2009 00:27:08.407 PDT Report End: 07/02/2009 00:27:17.110 PDT Gen. Time: 07/02/2009 00:32:39.121 PDT INBOUND SCAN EXPLOIT 116.24.228.186 (6) (00:27:08.407 PDT-00:27:17.110 PDT) event=1:22466 (2) {tcp} E2[rb] NETBIOS SMB-DS IPC$ unicode share access 445<-1056 (00:27:08.407 PDT) 445<-1344 (00:27:15.898 PDT) ------------------------- event=1:299913 (4) {tcp} E2[rb] SHELLCODE x86 0x90 unicode NOOP 2: 445<-1344 (00:27:17.083 PDT-00:27:17.110 PDT) 2: 445<-1056 (00:27:09.561 PDT-00:27:09.949 PDT) EXPLOIT (slade) EGG DOWNLOAD 116.24.228.186 (2) (00:27:22.099 PDT) event=1:2000047 {tcp} E3[rb] ET WORM Sasser Transfer _up.exe 9996<-1698 (00:27:22.099 PDT) ------------------------- event=1:31000004 {tcp} E3[rb] BotHunter Scrip-based Windows egg download .exe 9996->1698 (00:27:22.428 PDT) 193.74.22.160 (00:32:39.121 PDT) event=1:3000003 {tcp} E3[rb] BotHunter HTTP-based .exe Upload on backdoor port 1034->80 (00:32:39.121 PDT) C and C TRAFFIC PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT tcpslice 1246519628.407 1246519637.111 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.202.248' ============================== SEPARATOR ================================