Index of /publicDatasets/CTU-Malware-Capture-Botnet-192-2

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]11bc606269a161555431bacf37f7c1e4.exe.zip2016-09-30 22:26 393K 
[   ]2016-09-30_capture_win13.biargus2016-09-30 22:28 132M 
[   ]2016-09-30_capture_win13.binetflow2016-09-30 22:28 104M 
[   ]2016-09-30_capture_win13.capinfos2016-09-30 22:13 1.1K 
[   ]2016-09-30_capture_win13.dnstop2016-09-30 22:12 2.5K 
[TXT]2016-09-30_capture_win13.html2016-09-30 22:28 353K 
[   ]2016-09-30_capture_win13.json2016-09-30 22:28 2.5K 
[   ]2016-09-30_capture_win13.mitm.weblog2016-12-06 08:04 465  
[   ]2016-09-30_capture_win13.passivedns2016-09-30 22:12 1.4K 
[   ]2016-09-30_capture_win13.pcap2016-09-30 21:55 239M 
[   ]2016-09-30_capture_win13.tcpdstat2016-09-30 22:13 1.9K 
[   ]2016-09-30_capture_win13.uniargus2016-10-11 20:35 179M 
[   ]2016-09-30_capture_win13.uninetflow2016-10-11 20:35 87M 
[   ]2016-09-30_capture_win13.weblogng2016-09-30 22:13 26M 
[   ]2016-09-30_win13.rrd2016-09-30 21:55 8.0M 
[TXT]README.html2017-01-15 16:28 1.9K 
[TXT]README.md2016-10-24 02:06 1.3K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-15 16:19 2.9K 
[   ]mitm.out2016-09-22 17:35 1.9K 

Description

Files

IP Addresses

- Infected host: 192.168.1.123
- Default GW: 192.168.1.2

Timeline

Thu Sep 22 17:29:55 CEST 2016

started win13

Thu Sep 22 17:34:57 CEST 2016

infected

Fri Sep 30 21:55:08 CEST 2016

power off