Index of /publicDatasets/CTU-Malware-Capture-Botnet-168-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]mitm.out2016-08-03 11:52 31M 
[   ]2016-07-30_capture-win1.pcap2016-08-03 11:54 69M 
[   ]2016-07-30_capture-win1.rrd2016-08-03 11:55 8.0M 
[   ]be8797e324da219fedf06732347c4993.exe.zip2016-08-03 12:07 100K 
[   ]2016-07-30_capture-win1.dnstop2016-08-03 12:09 15K 
[   ]2016-07-30_capture-win1.passivedns2016-08-03 12:09 18K 
[   ]2016-07-30_capture-win1.capinfos2016-08-03 12:09 760  
[   ]2016-07-30_capture-win1.weblogng2016-08-03 12:09 2.9M 
[   ]2016-07-30_capture-win1.json2016-08-03 12:18 3.1M 
[TXT]2016-07-30_capture-win1.html2016-08-03 12:18 2.0M 
[   ]2016-07-30_capture-win1.biargus2016-08-03 12:27 29M 
[   ]2016-07-30_capture-win1.binetflow2016-08-03 12:27 28M 
[   ]2016-07-30_capture-win1.tcpdstat2016-09-03 16:47 2.0K 
[TXT]README.md2016-10-11 19:54 1.7K 
[   ]2016-07-30_capture-win1.netflow52016-11-04 15:23 8.0M 
[   ]2016-07-30_capture-win1.mitm.weblog2017-01-11 12:50 2.9M 
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 20:48 12K 
[TXT]README.html2017-01-13 20:48 2.4K 
[DIR]bro/2017-08-31 09:45 -  

Description

Files

IP Addresses

- Infected host: 192.168.1.110
- Default GW: 192.168.1.2

Timeline

Sat Jul 30 14:51:09 CEST 2016

started win1

Sat Jul 30 14:54:12 CEST 2016

infected

Wed Aug 3 11:54:39 CEST 2016

power off