Index of /publicDatasets/CTU-Malware-Capture-Botnet-107-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]0cc9906c7bfcff6276910ac8fa48c280.exe.zip2015-12-16 10:26 38K 
[   ]2015-03-09_capture-win6.biargus2015-06-13 14:54 7.9M 
[   ]2015-03-09_capture-win6.binetflow2015-09-17 17:10 3.2M 
[   ]2015-03-09_capture-win6.capinfos2016-12-05 22:31 1.1K 
[   ]2015-03-09_capture-win6.dnstop2016-12-05 22:31 1.6K 
[   ]2015-03-09_capture-win6.passivedns2016-12-05 22:31 1.3K 
[   ]2015-03-09_capture-win6.pcap2015-03-09 14:20 11M 
[   ]2015-03-09_capture-win6.tcpdstat2016-12-05 22:31 1.3K 
[   ]2015-03-09_capture-win6.uniargus2016-12-05 22:31 21M 
[   ]2015-03-09_capture-win6.uninetflow2016-12-05 22:31 7.8M 
[   ]2015-03-09_capture-win6.weblogng2016-06-15 17:43 232  
[TXT]README.html2017-01-15 13:04 508  
[TXT]README.md2015-06-13 14:47 330  
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-15 13:04 1.6K 

Timeline

Sun Mar 1 12:00:06 CET 2015

started win6

Sun Mar 1 12:01:55 CET 2015

infected

infected perfectly, start sending packets to port 8080.

Mon Mar 9 14:53:54 CET 2015

The server froze and I have to stop this capture. A new one was started