[nsp-sec] [sec] Conficker Timecheck Daily Reports Data

Smith, Donald Donald.Smith at qwest.com
Tue Apr 21 17:04:01 EDT 2009


Thanks Yiming, Yiming and I both see about 10% corralation. I hoped for a much higher corralation/validation %.
I don't expect 100% but normally we get somewhere in the 50++ range.

Has anyone found any known false positivies in this data set?

Tim and team cymru I am not very comfortable with this data (yet) can we keep it off the main report and make it it's own report until the data gets better validated?


TIA

(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia   

> -----Original Message-----
> From: Yiming Gong [mailto:yiming.gong at xo.com] 
> Sent: Friday, April 17, 2009 4:04 PM
> To: Smith, Donald
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] [sec] Conficker Timecheck Daily Reports Data
> 
> For yesterday's data, of 76 XO IPs, 6 were correlated with my 
> past two 
> days' darknet data, and they show up as scanning on dark IPs on high 
> ports.  No port 445 scan though.
> 
> ip 			dport
> ++++++++++++++++
> 140.239.131.37  13916
> 207.110.38.9    26716
> 216.3.178.67    37247
> 67.91.188.107   21729
> 67.91.202.14    40708
> 67.94.26.90     7871
> 
> Regards!
> 
> Yiming
> 
> On 04/17/2009 02:48 PM, Smith, Donald wrote:
> > ----------- nsp-security Confidential --------
> >
> > I tried another approach. I looked for scanning for 445.
> > I see 9 ips out of the 100 I did a search in my flow report 
> for scanning for 445 so at least some of the identified 
> systems are showing conficker symptoms.
> > Has anyone else attempted to validate this data?
> > I know some of the ips identified in the timecheck report 
> showed up on other conficker lists but not all of the ips 
> identified. But I am a bit concerned about the possibility of FPs.
> >
> >
> > (coffee != sleep)&  (!coffee == sleep)
> >   Donald.Smith at qwest.com gcia
> > ________________________________
> > From: nsp-security-bounces at puck.nether.net 
> [nsp-security-bounces at puck.nether.net] On Behalf Of Smith, 
> Donald [Donald.Smith at qwest.com]
> > Sent: Friday, April 17, 2009 1:17 PM
> > To: nsp-security at puck.nether.net
> > Subject: [nsp-sec] FW: [sec] Conficker Timecheck Daily Reports Data
> >
> > ----------- nsp-security Confidential --------
> >
> > I am trying to validate the conficker-time check data.
> > Here is my process so far.
> >
> > Pull the ips from the source, sort and uniq them, build an 
> flow-nfilter acl based on PART of that. I "sampled" the top 
> 100 for my acl).
> > Find packets where the src and dst port are 2k or larger 
> print and sort the unique ports.
> >
> > Grep the top ports from the src file to see if it looks 
> like conficker p2p (static high port to static high port).
> > Check the ips to see if those ports match their conficker.c 
> p2p ports.
> > python ./get_ports.py ip_address.
> > I got zero matches so far. I have only done 6 unique IPs 
> but expected to see some p2p matches on the "correct" ports.
> >
> > What did I prove?
> >
> > I didn't prove that there is anything wrong conficker 
> timecheck data. The traffic that I see looks similar to 
> conficker p2p to me in that I am seeing static high port to 
> static high port communications but my conficker p2p port 
> generation tool isn't giving me any matches.
> >
> > Do we know if what version of conficker these should be. 
> The tool I am using generates .C or .D  p2p ports:(
> > If the time-check data is just the newest version (E) then 
> I may need to go find another p2p port generation tool.
> >
> >
> > _______________________________________________
> > nsp-security mailing list
> > nsp-security at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/nsp-security
> >
> > Please do not Forward, CC, or BCC this E-mail outside of 
> the nsp-security
> > community. Confidentiality is essential for effective 
> Internet security counter-measures.
> > _______________________________________________
> >
> >
> >
> > _______________________________________________
> > nsp-security mailing list
> > nsp-security at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/nsp-security
> >
> > Please do not Forward, CC, or BCC this E-mail outside of 
> the nsp-security
> > community. Confidentiality is essential for effective 
> Internet security counter-measures.
> > _______________________________________________
> >
> 
> 


More information about the nsp-security mailing list