Index of /publicDatasets/CTU-Malware-Capture-Botnet-194-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]5a6bd2a6fa1323ac96e860dfa6cbc9b6.exe.zip2016-10-13 18:08 2.0M 
[   ]2016-10-13_capture_win15.biargus2016-10-14 11:39 259M 
[   ]2016-10-13_capture_win15.binetflow2016-10-14 11:40 70M 
[   ]2016-10-13_capture_win15.capinfos2016-10-14 11:39 1.1K 
[   ]2016-10-13_capture_win15.dnstop2016-10-14 11:37 24K 
[   ]2016-10-13_capture_win15.mitm.weblog2016-12-05 21:40 57M 
[   ]2016-10-13_capture_win15.passivedns2016-10-14 11:37 581K 
[   ]2016-10-13_capture_win15.pcap2016-10-13 17:36 494M 
[   ]2016-10-13_capture_win15.tcpdstat2016-10-14 11:39 2.3K 
[   ]2016-10-13_capture_win15.uniargus2016-10-14 11:40 777M 
[   ]2016-10-13_capture_win15.uninetflow2016-10-14 11:42 498M 
[   ]2016-10-13_capture_win15.weblogng2016-10-14 11:39 33M 
[   ]2016-10-13_win15.rrd2016-10-13 17:37 8.0M 
[TXT]README.html2017-01-13 14:08 1.9K 
[TXT]README.md2016-10-14 10:03 1.4K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:08 166K 
[   ]mitm.out2016-10-13 17:38 321M 

Description

Files

IP Addresses

- Infected host: 192.168.1.125
- Default GW: 192.168.1.2

Timeline

Mon Sep 12 20:43:27 CEST 2016

started win15

Mon Sep 12 20:48:51 CEST 2016

infected

Thu Oct 13 17:36:33 CEST 2016

power off