[nsp-sec] Botnet takedown - Chinese SSH Brute Force
Hank Nussbacher
hank at efes.iucc.ac.il
Mon Apr 13 10:42:08 EDT 2015
>As an aside, below is a list of infected IPs we have recently seen
>communicating with the C2 and malware download sites. Quite a few on
>3356, 3549, and 4323. So ACK!
>
>Thanks,
>
>Brett
>
>victim_ip victim_asn c2:tcp_port
>128.139.172.3 378 162.218.112.7:8000
Brett,
Ack for AS378.
After checking with the end user it turns out to be a honeypot system.
We saw a lot of DNS lookups from 128.139.172.3 in between Fri, 06 Mar 2015
15:15:25 GMT till today.
What we found interesting from our pDNS logs was 2 IPs other than 8.8.8.8
that kept popping up:
103.25.9.228 and 59.188.237.12. I'd be interested to know what these 2 IPs
are (didn't find them listed in either blog post).
Part of our pDNS logs are below. If you want a fuller list, send me email
off-list.
1425654925.272386||128.139.172.3||8.8.8.8||IN||ndns.dsaj2a.com.||A||192.126.126.64||509||1
1425654925.284904||128.139.172.3||8.8.8.8||IN||info.3000uc.com.||A||23.234.60.140||478||1
1425654930.641971||128.139.172.3||8.8.8.8||IN||ndns.hcxiaoao.com.||A||23.252.161.214||37||1
1425654935.975137||128.139.172.3||8.8.8.8||IN||ndns.dsaj2a.org.||A||66.102.253.30||278||1
1425654941.353389||128.139.172.3||8.8.8.8||IN||ndns.dsaj2a1.org.||A||23.234.22.133||258||1
1425667583.278836||128.139.172.3||8.8.8.8||IN||info.3000uc.com.||A||23.234.60.140||33||1
1425668751.388831||128.139.172.3||8.8.8.8||IN||runfromme.no-ip.info.||A||192.3.150.194||55||1
1425694484.070142||128.139.172.3||8.8.8.8||IN||ndns.dsaj2a.org.||A||66.102.253.30||40||1
1425694489.507539||128.139.172.3||8.8.8.8||IN||ndns.dsaj2a1.org.||A||23.234.22.133||376||1
1427468891.618150||128.139.172.3||103.25.9.228||IN||wangzongfacai.com.||A||107.150.37.91||358||1
1427468891.618150||128.139.172.3||103.25.9.228||IN||www.wangzongfacai.com.||CNAME||wangzongfacai.com.||3232||1
1427469094.477268||128.139.172.3||103.25.9.228||IN||gh.dsaj2a1.org.||A||66.102.253.30||380||1
1427470178.857813||128.139.172.3||103.25.9.228||IN||info.3000uc.com.||A||23.234.60.140||513||1
1427470188.869282||128.139.172.3||103.25.9.228||IN||ndns.dsaj2a.com.||A||192.126.126.64||487||1
1427470189.428258||128.139.172.3||103.25.9.228||IN||ndns.hcxiaoao.com.||A||103.240.141.54||487||1
1427470351.834235||128.139.172.3||103.25.9.228||IN||ndns.dsaj2a.org.||A||103.240.140.152||332||1
1428338850.275850||128.139.172.3||59.188.237.12||IN||www.baidu.com.||A||59.188.242.190||3600||1
1428338962.471036||128.139.172.3||59.188.237.12||IN||www.baidu.com.||A||59.188.242.190||3600||254
1428338966.353464||128.139.172.3||8.8.8.8||IN||8uc.gddos.com.||A||59.188.242.190||599||322
1428363121.457414||128.139.172.3||8.8.8.8||IN||8uc.gddos.com.||A||59.188.242.190||490||1
1428363122.376281||128.139.172.3||59.188.237.12||IN||www.baidu.com.||A||59.188.242.190||3600||1
-Hank
More information about the nsp-security
mailing list