[dns-operations] MX record scanning
Jake Zack
jake.zack at cira.ca
Fri May 13 18:14:06 UTC 2011
.CA seeing the same pattern starting today at noon EDT.
bash-3.2# grep emwej19.ca named-queries.log
13-May-2011 14:00:15.703 queries: info: client 123.26.155.109#12123:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:18.466 queries: info: client 123.26.155.109#12501:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:23.293 queries: info: client 123.26.155.109#13166:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:26.384 queries: info: client 123.26.155.109#13562:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:26.951 queries: info: client 123.26.155.109#13630:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:32.146 queries: info: client 123.26.155.109#14317:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:33.564 queries: info: client 123.26.155.109#14493:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:35.868 queries: info: client 123.26.155.109#14760:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:38.341 queries: info: client 123.26.155.109#15116:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:42.406 queries: info: client 123.26.155.109#15586:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:45.748 queries: info: client 123.26.155.109#15969:
query: emwej19.ca IN MX + (192.228.27.X)
13-May-2011 14:00:47.661 queries: info: client 123.26.155.109#16212:
query: emwej19.ca IN MX + (192.228.27.X)
bash-3.2# grep emwej19.ca named-queries.log |wc -l
12
It's not just 12 queries.
It's 12 queries to each of the nameservers in our NS RRset, total 100+
queries for the same record in the span of 32 seconds.
Has anyone considered setting up a bogus DNS server+mail server and
using policy-routing to send queries from these confirmed botnet hosts
to it, to give some visibility into what it's doing at a lower level?
-Jacob Zack
DNS Administrator - CIRA (.CA TLD)
On 12-May-11, at 3:17 AM, Rickard Dahlstrand wrote:
> Hi,
>
> We have also been tracking this for a while and made a simple SQL-
> query that you can use with our new tool PacketQ to quickly get a
> list of all IPs used by this botnet from a PCAP-file. Like Igor and
> some of you noticed, the client doesn't set the transaction ID to a
> value greater than 256 and this allows us to make the following
> simple query.
>
> # packetq --csv -s "select stdev(msg_id) as
> STDAV,src_addr,qname,count(*) as Antal from dns group by src_addr
> having Antal>100 and STDAV<100 order by src_addr desc " peak/07/
> G.ns.se-20110408-071500-em1.pcap.gz | less
>
> "STDAV" ,"src_addr" ,"qname" ,"Antal"
> 74.629547,"95.82.107.106" ,"aupuj.se." ,1669
> 73.147445,"95.81.86.43" ,"xtade.se." ,333
> 71.684573,"95.81.105.20" ,"emxoh-sebmm.se." ,336
> 72.573712,"95.59.74.229" ,"rienm-pmok.se." ,947
> 75.940259,"95.59.22.195" ,"sicon.se." ,185
> 73.950355,"95.56.83.96" ,"csehm.se." ,4280
> 75.612308,"95.182.54.17" ,"ce.luth.se." ,1573
> 74.628871,"95.177.13.34" ,"osdmm.se." ,3429
> 73.082288,"95.158.3.130" ,"vmmre2003.se." ,512
> 73.826874,"95.135.83.29" ,"ismag.se." ,4940
> 74.313821,"95.134.123.83" ,"qcveb.se." ,357
> 73.659671,"95.133.188.120" ,"0md7sma795xj.se." ,2964
> 72.658138,"94.96.154.239" ,"topesa.se." ,516
> 73.737935,"94.59.57.23" ,"pessa.se." ,628
> 72.062089,"94.55.108.244" ,"avoye.se." ,416
> 73.018824,"94.141.66.136" ,"sunma.se." ,1831
> 73.814160,"93.73.26.41" ,"tkobrlhcjq.se." ,4496
> 74.263140,"93.187.166.1" ,"hesmu2003.se." ,4813
> .
> .
>
> PacketQ can be downloaded from https://github.com/dotse/PacketQ and
> we have a mailing-list set up at http://lists.iis.se/mailman/listinfo/packetq
> for any PacketQ-related questions.
>
> Rickard.
>
>
>
> 11 maj 2011 kl. 21.53 skrev José A. Domínguez:
>
>> On 05/11/2011 12:27 PM, Gilles Massen wrote:
>>>
>>> Why has there to be an entity "in charge"? From an operational
>>> point of
>>> view the CERT to whom you are affiliated would seem the right
>>> choice. It
>>> might not have the resources to handle it, but should have the
>>> contacts to
>>> forward it to a useful place (cf. the email from Tim, Team Cymru).
>>> From an
>>> idealistic point I'd rather have law enforcement track down the
>>> spammers....that is the *only* effective manner.
>>>
>>> But the point I'm trying to make is that this is not a specific DNS
>>> problem: DNS is one little helper in the chain. At the end of the
>>> day, the
>>> bot is sending a spam email and will get caught by a spamtrap.
>>> Like the
>>> others that are not working on a poisoned list.
>>>
>>
>> I agree with your statements right now. Once thing that we should
>> try to
>> get is forensics in some of the machines doing this query so we can
>> figure
>> out which botnet (or botnets) we are dealing with and whether it is
>> just
>> new service on top of some well-know botnets.
>>
>> José.
>>
>> <signature.asc>_______________________________________________
>> dns-operations mailing list
>> dns-operations at lists.dns-oarc.net
>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>> dns-jobs mailing list
>> https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-jobs mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
>
More information about the dns-operations
mailing list