[nsp-sec] botnet C&C at The Planet and malware download at dyndns.com client
Nick Hale
nspsec at rtfmnewbie.com
Mon Mar 26 13:54:19 EDT 2012
Thanks for the heads up on this one. I'm digging into this C&C now.
For the record, "The Planet" no longer exists as a company, it's a part of SoftLayer.
Regards,
Nick
SoftLayer Technologies, Inc.
Abuse Team
On 3/26/2012 11:08, Tim Wilde wrote:
> ----------- nsp-security Confidential --------
>
> On 3/26/2012 11:53 AM, CERT-UT - Peter wrote:
>> This host contacted something that looked like a C&C:
>>> 2012-03-26 12:30:36.514 0.000 TCP 174.123.217.5:6667 ->
>>> 130.89.36.159:38141 1 52 1 2012-03-26
>>> 12:32:12.450 0.128 TCP 174.123.217.5:6667 ->
>>> 130.89.36.159:38141 2 127 1 2012-03-26
>>> 12:32:12.450 0.000 TCP 130.89.36.159:38141 ->
>>> 174.123.217.5:6667 1 74 1 2012-03-26
>>> 12:33:50.331 4.032 TCP 174.123.217.5:6667 ->
>>> 130.89.36.159:38141 3 225 1 2012-03-26
>>> 12:33:58.991 10.752 TCP 174.123.217.5:6667 ->
>>> 130.89.36.159:38141 2 150 1 2012-03-26
>>> 12:34:31.352 0.000 TCP 174.123.217.5:6667 ->
>>> 130.89.36.159:38141 1 75 1 2012-03-26
>>> 12:35:08.808 6.848 TCP 194.109.20.90:6667 ->
>>> 130.89.36.159:53506 6 510 1 2012-03-26
>>> 12:35:17.160 0.000 TCP 174.123.217.5:6667 ->
>>> 130.89.36.159:38141 1 146 1 2012-03-26
>>> 12:37:00.700 0.000 TCP 194.109.20.90:6667 ->
>>> 130.89.36.159:53506 1 85 1
>
> Chris,
>
> 174.123.217.5:6667 does in fact look like a C&C, we have probed it and
> added it to the DDoS-RS. Thanks for pointing it out!
>
>> Shortly after this the system contacted another site on port 80.
>> C&C or malware? This host is currently known as
>> checkip-iad.dyndns.com.
>
>>> 2012-03-26 12:48:32.333 9.024 TCP 130.89.36.159:56658 ->
>>> 216.146.38.70:80 3 180 1 2012-03-26
>>> 12:48:35.236 8.960 TCP 216.146.38.70:80 ->
>>> 130.89.36.159:56658 4 240 1 2012-03-26
>>> 12:48:50.564 6.016 TCP 216.146.38.70:80 ->
>>> 130.89.36.159:56658 3 180 1 2012-03-26
>>> 12:49:17.033 0.000 TCP 130.89.36.159:56658 ->
>>> 216.146.38.70:80 1 60 1 2012-03-26
>>> 12:49:17.106 8.960 TCP 216.146.38.70:80 ->
>>> 130.89.36.159:56658 3 180 1 2012-03-26
>>> 12:49:38.473 0.000 TCP 216.146.38.70:80 ->
>>> 130.89.36.159:56658 1 60 1
>
> This is not a C&C, but a legitimate IP checking service run by Dyn,
> Inc. Possibly being abused by the malware to find its public IP,
> possibly unrelated to the malware.
>
> Best regards,
> Tim
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
More information about the nsp-security
mailing list