Index of /publicDatasets/CTU-Malware-Capture-Botnet-190-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]99b84137b5b8b3c522414e332526785e506ed2dbe557eafc40a7bcf47b623d88.exe.zip2016-09-28 23:09 726K 
[   ]2016-09-28_capture_win17.biargus2017-06-29 18:22 14M 
[   ]2016-09-28_capture_win17.binetflow2017-06-29 18:22 7.1M 
[   ]2016-09-28_capture_win17.capinfos2017-06-29 18:22 1.1K 
[   ]2016-09-28_capture_win17.dnstop2017-06-29 18:22 1.7K 
[TXT]2016-09-28_capture_win17.html2017-06-29 21:34 802K 
[   ]2016-09-28_capture_win17.json2017-06-29 21:34 778K 
[   ]2016-09-28_capture_win17.passivedns2017-06-29 18:22 1.1K 
[   ]2016-09-28_capture_win17.pcap2017-06-29 18:22 14M 
[   ]2016-09-28_capture_win17.tcpdstat2017-06-29 18:22 1.8K 
[   ]2016-09-28_capture_win17.uniargus2017-06-29 18:22 210M 
[   ]2016-09-28_capture_win17.uninetflow2017-06-29 18:22 113M 
[   ]2016-09-28_capture_win17.weblogng2017-06-29 18:22 2.2M 
[   ]2016-09-28_win17.rrd2016-09-28 22:42 8.0M 
[TXT]README.html2017-06-29 20:58 2.0K 
[TXT]README.md2017-06-29 20:58 1.4K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-06-29 18:22 7.9K 

Description

Files

IP Addresses

- Infected host: 192.168.1.127
- Default GW: 192.168.1.2

Timeline

Wed Sep 14 12:02:47 CEST 2016

started winX

Wed Sep 14 12:03:54 CEST 2016

infected

Wed Sep 28 22:40:29 CEST 2016

power off