Index of /publicDatasets/CTU-Malware-Capture-Botnet-192-4

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-12-26_win17.biargus2016-12-26 15:59 2.8M 
[   ]2016-12-26_win17.binetflow2016-12-26 15:59 1.6M 
[   ]2016-12-26_win17.capinfos2016-12-26 15:59 1.1K 
[   ]2016-12-26_win17.dnstop2016-12-26 15:59 2.7K 
[TXT]2016-12-26_win17.html2016-12-26 16:03 353K 
[   ]2016-12-26_win17.json2016-12-26 16:03 2.5K 
[   ]2016-12-26_win17.mitm.weblog2016-12-26 15:59 287  
[   ]2016-12-26_win17.passivedns2016-12-26 15:59 1.4K 
[   ]2016-12-26_win17.pcap2016-12-26 15:53 36M 
[   ]2016-12-26_win17.rrd2016-12-26 15:54 8.0M 
[   ]2016-12-26_win17.tcpdstat2016-12-26 15:59 1.9K 
[   ]2016-12-26_win17.weblogng2016-12-26 15:59 33K 
[   ]1831806fc27d496f0f9dcfd8402724189deaeb5f8bcf0118f3d6484d0bdee9ed.exe.zip2016-12-26 16:02 393K 
[DIR]CTU-Malware-Capture-Botnet-192-4/2022-01-30 12:06 -  
[TXT]README.html2016-12-26 16:02 3.2K 
[TXT]README.md2016-12-26 16:02 2.5K 
[DIR]bro/2016-12-26 15:59 -  
[   ]mitm.out2016-12-21 23:51 0  

Description

Files

IP Addresses

- Infected host: 192.168.1.127
- Default GW: 192.168.1.2

Timeline

Wed Dec 21 23:51:37 CET 2016

started win17

Wed Dec 21 23:53:16 CET 2016

infected

The program is a type of remote desktop, so it connects to its server on port 443. But since it is a remote administration tool, the content in port 443 is not SSL/TLS, is custom.

Mon Dec 26 15:53:57 CET 2016

power off