Index of /publicDatasets/CTU-Malware-Capture-Botnet-192-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-09-30_capture_win12.biargus2016-09-30 21:45 65M 
[   ]2016-09-30_capture_win12.binetflow2016-09-30 21:45 51M 
[   ]2016-09-30_capture_win12.capinfos2016-09-30 21:40 1.1K 
[   ]2016-09-30_capture_win12.dnstop2016-09-30 21:39 2.7K 
[TXT]2016-09-30_capture_win12.html2017-09-11 16:03 353K 
[   ]2016-09-30_capture_win12.json2017-09-11 16:03 2.7K 
[   ]2016-09-30_capture_win12.passivedns2016-09-30 21:39 1.7K 
[   ]2016-09-30_capture_win12.pcap2016-09-30 21:22 120M 
[   ]2016-09-30_capture_win12.rrd2016-09-30 21:23 8.0M 
[   ]2016-09-30_capture_win12.tcpdstat2016-09-30 21:40 1.9K 
[   ]2016-09-30_capture_win12.uniargus2016-10-14 11:29 89M 
[   ]2016-09-30_capture_win12.uninetflow2016-10-14 11:29 43M 
[   ]2016-09-30_capture_win12.weblogng2016-09-30 21:40 13M 
[   ]1831806fc27d496f0f9dcfd8402724189deaeb5f8bcf0118f3d6484d0bdee9ed.exe.zip2016-09-30 21:43 393K 
[TXT]README.html2017-06-29 20:48 2.0K 
[TXT]README.md2017-06-29 20:48 1.4K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:08 2.9K 

Description

Files

IP Addresses

- Infected host: 192.168.1.122
- Default GW: 192.168.1.2

Timeline

Mon Sep 26 15:28:54 CEST 2016

started win12

Mon Sep 26 15:44:40 CEST 2016

infected

Fri Sep 30 21:22:28 CEST 2016

power off