Fri Nov 09, 2018 5:22 am
So after capturing some DNS logging to file I was able to pinpoint what looks like a PC that is infected that is sending random DNS queries for non-existent internal hosts; example (jnyyhwarsradr.fic)
what to make of this?
dns,packet --- got query from 10.0.0.169:50391:
Nov/09/2018 14:12:35 dns,packet id:8e71 rd:1 tc:0 aa:0 qr:0 ra:0 QUERY 'no error'
Nov/09/2018 14:12:35 dns,packet question: jnyyhwarsradr.fic:A:IN
Nov/09/2018 14:12:35 dns query from 10.0.0.169: #16483371 jnyyhwarsradr.fic. A
Nov/09/2018 14:12:35 dns,packet --- sending udp query to 59.86.160.27:53:
Nov/09/2018 14:12:35 dns,packet id:f1fc rd:1 tc:0 aa:0 qr:0 ra:0 QUERY 'no error'
Nov/09/2018 14:12:35 dns,packet question: jnyyhwarsradr.fic:A:IN
Nov/09/2018 14:12:35 dns,packet --- got query from 10.0.0.169:54500:
Nov/09/2018 14:12:35 dns,packet id:fe9b rd:1 tc:0 aa:0 qr:0 ra:0 QUERY 'no error'
Nov/09/2018 14:12:35 dns,packet question: ychjbquor.fic:A:IN
Nov/09/2018 14:12:35 dns query from 10.0.0.169: #16483372 ychjbquor.fic. A
Nov/09/2018 14:12:35 dns,packet --- sending udp query to 59.86.160.27:53:
Nov/09/2018 14:12:35 dns,packet id:146e rd:1 tc:0 aa:0 qr:0 ra:0 QUERY 'no error'
Nov/09/2018 14:12:35 dns,packet question: ychjbquor.fic:A:IN
Nov/09/2018 14:12:35 dns,packet --- got query from 10.0.0.169:64073:
Nov/09/2018 14:12:35 dns,packet id:63b1 rd:1 tc:0 aa:0 qr:0 ra:0 QUERY 'no error'
Nov/09/2018 14:12:35 dns,packet question: uengnhqnsa.fic:A:IN
Nov/09/2018 14:12:35 dns query from 10.0.0.169: #16483373 uengnhqnsa.fic. A
Nov/09/2018 14:12:35 dns,packet --- sending udp query to 59.86.160.27:53:
Nov/09/2018 14:12:35 dns,packet id:56ac rd:1 tc:0 aa:0 qr:0 ra:0 QUERY 'no error'
Nov/09/2018 14:12:35 dns,packet question: uengnhqnsa.fic:A:IN
Nov/09/2018 14:12:35 dns,packet --- got answer from 59.86.160.27:53:
Nov/09/2018 14:12:35 dns,packet id:f1fc rd:1 tc:0 aa:0 qr:1 ra:1 QUERY 'name error'
Nov/09/2018 14:12:35 dns,packet question: jnyyhwarsradr.fic:A:IN
Nov/09/2018 14:12:35 dns,packet authority:
Nov/09/2018 14:12:35 dns,packet <:SOA:3600=serial:2018110801 refresh:1800 retry:900 expire:604800 min:86400 >
Nov/09/2018 14:12:35 dns done query: #16483371 dns name does not exist
Nov/09/2018 14:12:35 dns,packet --- sending reply to 10.0.0.169:50391:
Nov/09/2018 14:12:35 dns,packet id:8e71 rd:1 tc:0 aa:0 qr:1 ra:1 QUERY 'name error'
Nov/09/2018 14:12:35 dns,packet question: jnyyhwarsradr.fic:A:IN
Nov/09/2018 14:12:35 dns,packet --- got answer from 59.86.160.27:53:
Nov/09/2018 14:12:35 dns,packet id:146e rd:1 tc:0 aa:0 qr:1 ra:1 QUERY 'name error'
Nov/09/2018 14:12:35 dns,packet question: ychjbquor.fic:A:IN
Nov/09/2018 14:12:35 dns,packet authority:
Nov/09/2018 14:12:35 dns,packet <:SOA:3600=serial:2018110801 refresh:1800 retry:900 expire:604800 min:86400 >
Nov/09/2018 14:12:35 dns done query: #16483372 dns name does not exist
Nov/09/2018 14:12:35 dns,packet --- sending reply to 10.0.0.169:54500:
Nov/09/2018 14:12:35 dns,packet id:fe9b rd:1 tc:0 aa:0 qr:1 ra:1 QUERY 'name error'
Nov/09/2018 14:12:35 dns,packet question: ychjbquor.fic:A:IN
Nov/09/2018 14:12:35 dns,packet --- got answer from 59.86.160.27:53:
Nov/09/2018 14:12:35 dns,packet id:56ac rd:1 tc:0 aa:0 qr:1 ra:1 QUERY 'name error'
Nov/09/2018 14:12:35 dns,packet question: uengnhqnsa.fic:A:IN
Nov/09/2018 14:12:35 dns,packet authority:
Nov/09/2018 14:12:35 dns,packet <:SOA:3600=serial:2018110801 refresh:1800 retry:900 expire:604800 min:86400 >
Nov/09/2018 14:12:35 dns done query: #16483373 dns name does not exist
Nov/09/2018 14:12:35 dns,packet --- sending reply to 10.0.0.169:64073:
Nov/09/2018 14:12:35 dns,packet id:63b1 rd:1 tc:0 aa:0 qr:1 ra:1 QUERY 'name error'
Nov/09/2018 14:12:35 dns,packet question: uengnhqnsa.fic:A:IN
Nov/09/2018