Last Friday, I received an email forwarded to me with the data below. I am not sure about the details of the detection system in play here, but it looks like some form of packet sniffing that picked up some malware signature of an Windows executable. My PC is behind a proxy server, and the proxy was flagged as the "host" in this case, but it apparently mapped the connection to my PC. What is particularly interesting is the SRC and DST address of the packet, neither of which are mine or the anywhere near our network(s). At the time of the alert, I was probably doing some random browsing as I had a heavy processing task working in the background. I did not download this file.
In response, I captured a process output and a network connection output and correlated the two via PID. I did not see any unusual network connections or processes. I ran a scan with Symantec and Malwarebytes. The former found a very-low risk category Java trojan in the Internet temp folder and deleted it (killing the time stamp, (thanks Symantec)) and MB came up completely clean.
I've Googled the 'strings' in the email below and have come up blank. Dshield, KB Bot Hunter, and a few other sites report no threats associated with these IP other than one is on a couple of spamhaus RBLs for SPAM and the other has a lot of MX records associated with it and different domain names. To me this looks like some form of XSS, especially given the odd source and destination that aren't mine. Any thoughts as to what this may have been or might be?
In response, I captured a process output and a network connection output and correlated the two via PID. I did not see any unusual network connections or processes. I ran a scan with Symantec and Malwarebytes. The former found a very-low risk category Java trojan in the Internet temp folder and deleted it (killing the time stamp, (thanks Symantec)) and MB came up completely clean.
I've Googled the 'strings' in the email below and have come up blank. Dshield, KB Bot Hunter, and a few other sites report no threats associated with these IP other than one is on a couple of spamhaus RBLs for SPAM and the other has a lot of MX records associated with it and different domain names. To me this looks like some form of XSS, especially given the odd source and destination that aren't mine. Any thoughts as to what this may have been or might be?
Code:
Body: FILE-IDENTIFY Portable Executable binary file magic detection (1:1000207) T=
imestamp : 2012-06-07 11:31:46
Internet Protocol, Src: 91.205.74.64 (91-205-74-64.arpa.teredo.pl), Dst: 15=
2.2.91.188 (Cannot Resolve) Transmission Control Protocol, Src Port: 80 (80=
), Dst Port: 8775 (8775), Seq: 1, Ack: 1, Len: 1460 Packet Text
........
._@..E....u@.7...[.J@..[..P"G....@...P.. .&..HTTP/1.1 200 OK
Server: nginx/1.2.0
Date: Thu, 07 Jun 2012 15:30:37 GMT
Content-Type: application/octet-stream
Content-Length: 117760
Connection: close
X-Powered-By: PHP/5.3.13-1~dotdeb.0
Content-Disposition: inline; filename=3DGXMtPBIs.exe
MZ......................@.