[unisog] ET DROP Known Bot C&C Server Traffic --> 18.104.22.168
Arthur Boos Jr
boos at cpd.ufrgs.br
Fri Jul 11 18:05:57 GMT 2008
With tons of domains resolving to that IP, it's possible trigger
the rule just loading a malitious page. I've found one, when I was
googling. Usually, a infected computer try to conect to a C&C server
at a regular basis, am I right ? But the mostly of my systems triggered
that sid just once (or twice, in one ocasion), so there isn't much
traffic to see. Maybe I should take a look at those system processes...
UFRGS - BR
Universidade Federal do Rio Grande do Sul
Stephen Gill escreveu:
> Hi Arthur,
>> Since some weeks ago, we started getting many hits on rule
>> "ET DROP Known Bot C&C Server Traffic (group 7)" (SID 2404006),
>> with traffic going to 22.214.171.124 (ports 25, 80 and 443).
>> The related packet is:
>> 07/01/08-20:56:55.976724 XXX.XXX.XX.XX:2561 -> 126.96.36.199:80
>> TCP TTL:127 TOS:0x0 ID:35416 IpLen:20 DgmLen:48 DF
>> ******S* Seq: 0x74043F2B Ack: 0x0 Win: 0xFFFF TcpLen: 28
>> TCP Options (4) => MSS: 1460 NOP NOP SackOK
>> I run some antivirus online on a few machines, but I could
>> not detect any bot infection. Has anyone got false positives
>> on events hiting that rule ?
> Can you figure out which DNS entries and/or processes are making those
> queries from the clients in question?
> That IP has a lot of stuff on it. EG:
> However, it has also hosted C&Cs on those ports (as per your snort rule) so
> you'll probably need to do a bit more digging to find out what site the
> hosts are connecting to in order to make a more accurate determination.
> -- steve
>> UFRGS - BR
>> Universidade Federal do Rio Grande do Sul
>> unisog mailing list
>> unisog at lists.dshield.org
More information about the unisog