Score: 0.8 (>= 0.8) Infected Target: 130.107.255.236 Infector List: 119.234.18.148 Egg Source List: 119.234.18.148 C & C List: Peer Coord. List: Resource List: Observed Start: 09/01/2009 20:37:47.151 PDT Report End: 09/01/2009 20:37:49.851 PDT Gen. Time: 09/01/2009 20:37:50.884 PDT INBOUND SCAN EXPLOIT 119.234.18.148 (29) (20:37:47.151 PDT-20:37:49.851 PDT) event=1:21390 (14) {tcp} E2[rb] REGISTERED FREE SHELLCODE x86 inc ebx NOOP 2: 445<-60011 (20:37:49.362 PDT-20:37:49.382 PDT) 2: 445<-59987 (20:37:49.721 PDT-20:37:49.751 PDT) 2: 445<-59962 (20:37:49.625 PDT-20:37:49.655 PDT) 2: 445<-60005 (20:37:49.525 PDT-20:37:49.554 PDT) 2: 445<-60002 (20:37:49.821 PDT-20:37:49.851 PDT) 2: 445<-59584 (20:37:47.151 PDT-20:37:47.181 PDT) 2: 445<-60008 (20:37:49.391 PDT-20:37:49.421 PDT) ------------------------- event=1:23003 {tcp} E2[rb] NETBIOS SMB-DS Session Setup NTMLSSP unicode asn1 overflow attempt 445<-60005 (20:37:49.472 PDT) ------------------------- event=1:299998 (14) {tcp} E2[rb] SHELLCODE x86 inc ebx NOOP 2: 445<-60011 (20:37:49.362 PDT-20:37:49.382 PDT) 2: 445<-59962 (20:37:49.625 PDT-20:37:49.655 PDT) 2: 445<-59584 (20:37:47.151 PDT-20:37:47.181 PDT) 2: 445<-60008 (20:37:49.391 PDT-20:37:49.421 PDT) 2: 445<-60005 (20:37:49.525 PDT-20:37:49.554 PDT) 2: 445<-60002 (20:37:49.821 PDT-20:37:49.851 PDT) 2: 445<-59987 (20:37:49.721 PDT-20:37:49.751 PDT) EXPLOIT (slade) EGG DOWNLOAD 119.234.18.148 (9) (20:37:47.151 PDT) event=1:2001683 {tcp} E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host 1028<-60391 (20:37:50.884 PDT) ------------------------- event=1:3000006 (7) {tcp} E3[rb] BotHunter MALWARE executable upload 445<-59584 (20:37:47.151 PDT) 445<-60011 (20:37:49.362 PDT) 445<-60008 (20:37:49.391 PDT) 445<-60005 (20:37:49.525 PDT) 445<-59962 (20:37:49.625 PDT) 445<-59987 (20:37:49.721 PDT) 445<-60002 (20:37:49.821 PDT) ------------------------- event=1:5001684 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host 1028<-60391 (20:37:50.884 PDT) C and C TRAFFIC PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT tcpslice 1251862667.151 1251862669.852 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.255.236' ============================== SEPARATOR ================================