Index of /publicDatasets/CTU-Malware-Capture-Botnet-169-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-08-04_capture-win3.biargus2016-08-04 14:47 4.9M 
[   ]2016-08-04_capture-win3.binetflow2016-08-04 14:47 5.1M 
[   ]2016-08-04_capture-win3.capinfos2016-08-04 14:43 759  
[   ]2016-08-04_capture-win3.dnstop2016-08-04 14:43 23K 
[TXT]2016-08-04_capture-win3.html2016-08-04 14:45 37M 
[   ]2016-08-04_capture-win3.json2016-08-04 14:45 66M 
[   ]2016-08-04_capture-win3.mitm.weblog2016-12-05 22:17 1.1M 
[   ]2016-08-04_capture-win3.passivedns2016-08-04 14:43 116K 
[   ]2016-08-04_capture-win3.pcap2016-08-04 14:12 39M 
[   ]2016-08-04_capture-win3.rrd2016-08-04 14:12 8.0M 
[   ]2016-08-04_capture-win3.tcpdstat2016-09-03 16:45 2.0K 
[   ]2016-08-04_capture-win3.uniargus2016-10-11 15:36 6.2M 
[   ]2016-08-04_capture-win3.uninetflows2016-10-11 17:16 3.5M 
[   ]2016-08-04_capture-win3.weblogng2016-08-04 14:43 853K 
[TXT]README.html2017-01-13 20:48 2.3K 
[TXT]README.md2016-08-05 12:36 1.7K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]domains-requested.md2017-06-29 17:07 3.6K 
[TXT]domains.in.1691.md2017-06-29 17:11 1.5K 
[TXT]domains.in.1693.md2017-06-29 17:11 5.3K 
[   ]e12a2c2b633ac12cec3e0d32950dcd5011d2aba4a9b95506c0fd3913446d7c22_miuref.exe.zip2016-08-04 14:44 87K 
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 20:48 212K 
[TXT]http.domains.md2017-06-15 21:44 1.8K 
[TXT]https.domains.md2017-06-15 21:43 1.3K 
[   ]mitm.out2016-08-04 14:09 33M 

Description

Files

IP Addresses

- Infected host: 192.168.1.113
- Default GW: 192.168.1.2

Timeline

Wed Aug 3 20:27:56 CEST 2016

started win3

Wed Aug 3 20:29:45 CEST 2016

infected

Thu Aug 4 2016

power off

Analysis

The malware connects to servers using the port 443/TCP, but the traffic is not TLS or SSL. We know it because the mitm proxy was complaining that the handshake was broken and when we checked, the traffic does not have the structure of SSL or TLS.