Score: 0.8 (>= 0.8) Infected Target: 130.107.134.142 Infector List: 95.91.227.209 Egg Source List: 95.91.227.209 C & C List: Peer Coord. List: Resource List: Observed Start: 09/03/2009 21:36:49.017 PDT Report End: 09/03/2009 21:37:20.535 PDT Gen. Time: 09/03/2009 21:37:20.535 PDT INBOUND SCAN EXPLOIT 95.91.227.209 (21) (21:36:49.021 PDT-21:37:20.535 PDT) event=1:21390 (10) {tcp} E2[rb] REGISTERED FREE SHELLCODE x86 inc ebx NOOP 2: 445<-4674 (21:36:49.021 PDT-21:36:49.025 PDT) 2: 445<-3099 (21:37:08.769 PDT-21:37:08.773 PDT) 2: 445<-3262 (21:37:20.532 PDT-21:37:20.535 PDT) 2: 445<-1925 (21:37:06.872 PDT-21:37:06.875 PDT) 2: 445<-3187 (21:37:20.466 PDT-21:37:20.470 PDT) ------------------------- event=1:23003 {tcp} E2[rb] NETBIOS SMB-DS Session Setup NTMLSSP unicode asn1 overflow attempt 445<-1925 (21:37:06.861 PDT) ------------------------- event=1:299998 (10) {tcp} E2[rb] SHELLCODE x86 inc ebx NOOP 2: 445<-3187 (21:37:20.466 PDT-21:37:20.470 PDT) 2: 445<-3262 (21:37:20.532 PDT-21:37:20.535 PDT) 2: 445<-3099 (21:37:08.769 PDT-21:37:08.773 PDT) 2: 445<-4674 (21:36:49.021 PDT-21:36:49.025 PDT) 2: 445<-1925 (21:37:06.872 PDT-21:37:06.875 PDT) EXPLOIT (slade) EGG DOWNLOAD 95.91.227.209 (7) (21:36:49.017 PDT) event=1:2001683 {tcp} E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host 1028<-2469 (21:36:51.066 PDT) ------------------------- event=1:3000006 (5) {tcp} E3[rb] BotHunter MALWARE executable upload 445<-4674 (21:36:49.017 PDT) 445<-1925 (21:37:06.867 PDT) 445<-3099 (21:37:08.765 PDT) 445<-3187 (21:37:20.462 PDT) 445<-3262 (21:37:20.528 PDT) ------------------------- event=1:5001684 {tcp} E3[rb] BotHunter Malware Windows executable (PE) sent from remote host 1028<-2469 (21:36:51.066 PDT) C and C TRAFFIC PEER COORDINATION OUTBOUND SCAN ATTACK PREP DECLARE BOT tcpslice 1252039009.017 1252039040.536 inputFile.tcpd | tcpdump -r - -w outputFile.tcpd 'host 130.107.134.142' ============================== SEPARATOR ================================