Score: 1.8 (>= 0.8) Infected Target: 130.107.254.189 Infector List: 62.47.212.7 Egg Source List: 62.47.212.7 C & C List: 66.252.13.214 (3) Peer Coord. List: Resource List: 66.252.13.214 Observed Start: 09/01/2009 02:30:09.744 PDT Report End: 09/01/2009 02:30:12.422 PDT Gen. Time: 09/01/2009 02:33:14.200 PDT INBOUND SCAN EXPLOIT 62.47.212.7 (20) (02:30:09.797 PDT-02:30:12.422 PDT) event=1:21390 (10) {tcp} E2[rb] REGISTERED FREE SHELLCODE x86 inc ebx NOOP 2: 139<-2089 (02:30:10.371 PDT-02:30:10.419 PDT) 2: 139<-2099 (02:30:10.635 PDT-02:30:10.683 PDT) 2: 445<-2045 (02:30:09.797 PDT-02:30:09.846 PDT) 2: 445<-2223 (02:30:12.372 PDT-02:30:12.422 PDT) 2: 139<-2090 (02:30:10.208 PDT-02:30:10.255 PDT) ------------------------- event=1:299998 (10) {tcp} E2[rb] SHELLCODE x86 inc ebx NOOP 2: 139<-2089 (02:30:10.371 PDT-02:30:10.419 PDT) 2: 445<-2045 (02:30:09.797 PDT-02:30:09.846 PDT) 2: 139<-2099 (02:30:10.635 PDT-02:30:10.683 PDT) 2: 445<-2223 (02:30:12.372 PDT-02:30:12.422 PDT) 2: 139<-2090 (02:30:10.208 PDT-02:30:10.255 PDT) EXPLOIT (slade) EGG DOWNLOAD 62.47.212.7 (7) (02:30:09.744 PDT) event=1:2001683 {tcp} E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host 1028<-2593 (02:30:14.925 PDT) ------------------------- event=1:3000006 (2) {tcp} E3[rb] BotHunter MALWARE executable upload 445<-2045 (02:30:09.744 PDT) 445<-2223 (02:30:12.319 PDT) ------------------------- event=1:32000004 (3) {tcp} E3[rb] BotHunter MALWARE executable upload 139<-2090 (02:30:10.154 PDT) 139<-2089 (02:30:10.319 PDT) 139<-2099 (02:30:10.582 PDT) ------------------------- event=1:5001684 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host 1028<-2593 (02:30:14.925 PDT) C and C TRAFFIC 66.252.13.214 (3) (02:33:13.852 PDT) event=1:2000355 {tcp} E4[rb] ET POLICY IRC authorization message 1030<-2081 (02:33:13.924 PDT) ------------------------- event=1:2406000 {tcp} E4[rb] ET rbN Known Russian Business Network Traffic - Hosting Nets 1030<-2081 (02:33:13.852 PDT) ------------------------- event=1:2406019 {tcp} E4[rb] ET RBN Known Russian Business Network Monitored Domains (15) 1030<-2081 (02:33:13.852 PDT) PEER COORDINATION OUTBOUND SCAN ATTACK PREP 66.252.13.214 (02:33:14.200 PDT) event=1:2000352 {tcp} E6[rb] ET ATTACK RESPONSE IRC - dns request on non-std port 1030->2081 (02:33:14.200 PDT) DECLARE BOT tcpslice 1251797409.744 1251797412.423 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.254.189' ============================== SEPARATOR ================================