Adding to this, cursory lookup of
CN.KING.CD shows that it has been used in the past to serve up malware (see:
http://blog.fireeye.com/research/2009/04/botnetweb-part-ii.html).
On Sun, Feb 7, 2010 at 10:11 AM, Stuart Kendrick
<skendric@xxxxxxxxx> wrote:
No, I haven't. Windows boxes broadcast NBNS look-ups and announcements for a
range of reasons, and chatter in this fashion with a loquacity I find
astonishing. But I haven't seen a single station broadcast with that frequency
(every few seconds) nor look-up the NetBIOS name 'CN.KING.CD'.
If I had to guess, I would make the same guess you are making. Sounds like you
have a bunch of boxes infected with some flavor of malware, (though I don't know
why that malware is performing CN.KING.CD look-ups every few seconds, nor why it
is using NBNS rather than DNS).
Brain-storming here: you could gather a list of the infected IP addresses using
Wireshark, then perform NBNS look-ups on those addresses:
C:\temp>nbtstat -A 10.11.88.152
Hutch:
Node IpAddress: [10.11.88.152] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
SALLY <00> UNIQUE Registered
FHCRC <00> GROUP Registered
SALLY <20> UNIQUE Registered
FHCRC <1E> GROUP Registered
MAC Address = 00-1A-A0-AF-A5-A9
C:\temp>
That gets you the NetBIOS name ('Sally') of the infected machine. With a little
local knowledge, perhaps you can track a NetBIOS name down to a physical location.
hth,
--sk
>
> Hi, I'm new to the list and thought I'd give this question a try.
>
>
> Has anyone seen a NBNS Broadcast where all the nodes on a link/ subnet are
> sending NBNS broadcasts with the following listed in Wireshark's
> "Info" column: "Name query NB
CN.KING.CD<00>"