Index of /publicDatasets/CTU-Malware-Capture-Botnet-108-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]25b8631afeea279ac00b2da70fffe18a.exe.zip2015-12-16 10:26 38K 
[   ]2015-03-09_capture-win7.biargus2015-06-13 14:44 7.9M 
[   ]2015-03-09_capture-win7.binetflow2015-09-17 17:09 3.2M 
[   ]2015-03-09_capture-win7.capinfos2016-12-05 22:31 1.1K 
[   ]2015-03-09_capture-win7.dnstop2016-12-05 22:31 1.6K 
[   ]2015-03-09_capture-win7.passivedns2016-12-05 22:31 1.3K 
[   ]2015-03-09_capture-win7.pcap2015-03-09 14:19 11M 
[   ]2015-03-09_capture-win7.tcpdstat2016-12-05 22:31 1.3K 
[   ]2015-03-09_capture-win7.uniargus2016-12-05 22:31 21M 
[   ]2015-03-09_capture-win7.uninetflow2016-12-05 22:31 7.8M 
[   ]2015-03-09_capture-win7.weblogng2016-06-15 18:04 232  
[TXT]README.html2017-01-15 13:04 638  
[TXT]README.md2015-06-13 14:30 449  
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-15 13:04 1.6K 

Timeline

Sun Mar 1 12:03:21 CET 2015

started win7

Sun Mar 1 12:04:45 CET 2015

perfectly infected. started sending packets to port 8080

Mon Mar 9 14:56:22 CET 2015

The server froze and I have to stop this capture. I started a new one