Index of /publicDatasets/CTU-Malware-Capture-Botnet-146-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2015-10-23_win3.biargus2016-12-05 22:27 3.4M 
[   ]2015-10-23_win3.binetflow2016-12-05 22:27 1.2M 
[   ]2015-10-23_win3.capinfos2015-10-23 12:28 752  
[   ]2015-10-23_win3.dnstop2015-10-23 12:28 2.1K 
[TXT]2015-10-23_win3.html2015-10-23 12:34 358K 
[   ]2015-10-23_win3.json2015-10-23 12:34 5.3K 
[   ]2015-10-23_win3.passivedns2015-10-23 12:28 3.2K 
[   ]2015-10-23_win3.pcap2015-10-23 12:28 21M 
[   ]2015-10-23_win3.rrd2015-10-23 12:28 8.0M 
[   ]2015-10-23_win3.tcpdstat2016-12-05 22:27 1.7K 
[   ]2015-10-23_win3.weblogng2016-06-15 17:44 2.2M 
[   ]Angelina_Jolie_Sex.scr2015-09-17 10:48 5.2M 
[TXT]README.html2017-01-14 17:00 2.0K 
[TXT]README.md2015-10-23 12:27 1.4K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-14 17:00 5.1K 

Descriptioon

Timeline

Thu Sep 17 10:46:37 CEST 2015

started win3

Thu Sep 17 10:50:07 CEST 2015

infected

Fri Sep 25 10:49:50 CEST 2015

We copied some fake documents in C:/Users/Administrator/Documents/ of the Administrator user to see if the malware is doing something with them. We copied using the shared folders, so no traffic was generated.

Fri Sep 25 13:04:01 CEST 2015

Up to now, nothing new happened

Fri Sep 25 13:04:31 CEST 2015

I rebooted the vm to see if something new would happen.

Wed, 14 Oct 2015 10:46:32 GMT

This is the time of the last communication with the CC. From this moment there were no packets send.

I will reboot the machine now to see what happens.

Thu Oct 15 12:07:22 CEST 2015

Rebooted the vm.

After the reboot it started working again. Not sure what happened.

Thu Oct 22 18:50:00 CEST 2015 approx

Vm stopped