Score: 1.3 (>= 0.8) Infected Target: 130.107.137.131 Infector List: 84.236.58.63 Egg Source List: 84.236.58.63 C & C List: 66.252.13.214 Peer Coord. List: Resource List: Observed Start: 09/01/2009 16:04:11.582 PDT Report End: 09/01/2009 16:04:21.714 PDT Gen. Time: 09/01/2009 16:13:40.257 PDT INBOUND SCAN EXPLOIT 84.236.58.63 (24) (16:04:11.587 PDT-16:04:21.714 PDT) event=1:21390 (12) {tcp} E2[rb] REGISTERED FREE SHELLCODE x86 inc ebx NOOP 2: 445<-49591 (16:04:21.710 PDT-16:04:21.714 PDT) 2: 139<-47945 (16:04:11.716 PDT-16:04:11.725 PDT) 2: 445<-49417 (16:04:20.602 PDT-16:04:20.609 PDT) 2: 139<-47921 (16:04:11.587 PDT-16:04:11.593 PDT) 2: 139<-48393 (16:04:14.236 PDT-16:04:14.248 PDT) 2: 445<-49270 (16:04:19.747 PDT-16:04:19.753 PDT) ------------------------- event=1:299998 (12) {tcp} E2[rb] SHELLCODE x86 inc ebx NOOP 2: 139<-48393 (16:04:14.236 PDT-16:04:14.248 PDT) 2: 139<-47945 (16:04:11.716 PDT-16:04:11.725 PDT) 2: 139<-47921 (16:04:11.587 PDT-16:04:11.593 PDT) 2: 445<-49417 (16:04:20.602 PDT-16:04:20.609 PDT) 2: 445<-49591 (16:04:21.710 PDT-16:04:21.714 PDT) 2: 445<-49270 (16:04:19.747 PDT-16:04:19.753 PDT) EXPLOIT (slade) EGG DOWNLOAD 84.236.58.63 (8) (16:04:11.582 PDT) event=1:2001683 {tcp} E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host 1028<-49778 (16:04:22.310 PDT) ------------------------- event=1:3000006 (3) {tcp} E3[rb] BotHunter MALWARE executable upload 445<-49270 (16:04:19.741 PDT) 445<-49417 (16:04:20.597 PDT) 445<-49591 (16:04:21.699 PDT) ------------------------- event=1:32000004 (3) {tcp} E3[rb] BotHunter MALWARE executable upload 139<-47921 (16:04:11.582 PDT) 139<-47945 (16:04:11.710 PDT) 139<-48393 (16:04:14.234 PDT) ------------------------- event=1:5001684 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host 1028<-49778 (16:04:22.310 PDT) C and C TRAFFIC 66.252.13.214 (16:13:40.257 PDT) event=1:2406019 {tcp} E4[rb] ET RBN Known Russian Business Network Monitored Domains (15) 1041<-2081 (16:13:40.257 PDT) PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT tcpslice 1251846251.582 1251846261.715 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.137.131' ============================== SEPARATOR ================================