Index of /publicDatasets/CTU-Malware-Capture-Botnet-152-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 22:18 6.7K 
[DIR]bro/2017-08-31 09:45 -  
[   ]a066f97be73f86b01ce60df2968adb631ad89e9e1e1380f6fecfabf898830cbf.exe.zip2016-05-28 12:49 480K 
[TXT]README.md2016-02-12 02:08 891  
[TXT]README.html2017-01-13 22:18 1.2K 
[   ]2016-02-12-capture_win9.weblogng2016-06-15 18:21 141K 
[   ]2016-02-12-capture_win9.uninetflow2016-12-05 22:26 2.1M 
[   ]2016-02-12-capture_win9.uniargus2016-12-05 22:26 3.3M 
[   ]2016-02-12-capture_win9.tcpdstat2016-09-03 16:54 1.7K 
[   ]2016-02-12-capture_win9.rrd2016-02-12 02:10 8.0M 
[   ]2016-02-12-capture_win9.pcap2016-02-12 02:07 8.8M 
[   ]2016-02-12-capture_win9.passivedns2016-02-12 02:11 15K 
[   ]2016-02-12-capture_win9.json2016-02-12 02:13 182K 
[TXT]2016-02-12-capture_win9.html2016-02-12 02:13 686K 
[   ]2016-02-12-capture_win9.dnstop2016-02-12 02:11 3.0K 
[   ]2016-02-12-capture_win9.capinfos2016-02-12 02:11 763  
[   ]2016-02-12-capture_win9.binetflow2016-07-11 17:14 1.1M 
[   ]2016-02-12-capture_win9.biargus2016-07-11 17:14 1.1M 

Description

Timeline

Mon Jan 25 21:49:23 CET 2016

Started win9

Mon Jan 25 21:51:01 CET 2016

infected

On Tue Jan 26 13:20:00 CET 2016 approximately, the malware stop sending WEB requests.

Since it didn't recover, I will reboot it.

Tue Jan 26 19:56:51 CET 2016

Restart

Fri Feb 12 02:08:11 CET 2016

Poweroff