Index of /publicDatasets/CTU-Malware-Capture-Botnet-109-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]5fce64eb222aa41e4fb967e9d8fb6a22.exe.zip2015-12-16 10:26 38K 
[   ]2015-03-09_capture-win8.biargus2015-06-12 15:38 44M 
[   ]2015-03-09_capture-win8.binetflow2015-09-17 17:09 43M 
[   ]2015-03-09_capture-win8.capinfos2016-12-05 22:31 1.1K 
[   ]2015-03-09_capture-win8.dnstop2016-12-05 22:31 1.6K 
[TXT]2015-03-09_capture-win8.html2015-06-12 14:54 131M 
[   ]2015-03-09_capture-win8.json2015-06-12 14:54 124M 
[   ]2015-03-09_capture-win8.passivedns2016-12-05 22:31 1.3K 
[   ]2015-03-09_capture-win8.pcap2017-04-25 09:27 93M 
[   ]2015-03-09_capture-win8.tcpdstat2016-12-05 22:31 1.4K 
[   ]2015-03-09_capture-win8.uniargus2016-12-05 22:31 31M 
[   ]2015-03-09_capture-win8.uninetflow2016-12-05 22:31 12M 
[   ]2015-03-09_capture-win8.weblogng2016-06-15 17:38 8.5M 
[TXT]README.html2017-04-25 09:28 501  
[TXT]README.md2015-06-12 14:37 324  
[DIR]bro/2017-04-25 09:28 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-15 13:04 196  

Timeline

Sun Mar 1 12:05:32 CET 2015

started win8

Sun Mar 1 12:07:03 CET 2015

Infected

perfectly infected. Started to send packets to port 8080

Mon Mar 9 15:00:11 CET 2015

The server froze and I have to stop the capture. I started a new one.