Index of /publicDatasets/CTU-Malware-Capture-Botnet-196-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-11-1_win9.rrd2016-11-04 16:02 8.0M 
[   ]2016-11-4_win9.biargus2016-11-04 16:17 10M 
[   ]2016-11-4_win9.binetflow2016-11-04 16:17 6.8M 
[   ]2016-11-4_win9.capinfos2016-11-04 16:17 1.1K 
[   ]2016-11-4_win9.dnstop2016-11-04 16:17 11K 
[TXT]2016-11-4_win9.html2016-11-04 16:59 30M 
[   ]2016-11-4_win9.json2016-11-04 16:59 61M 
[   ]2016-11-4_win9.mitm.weblog2016-12-05 21:39 211K 
[   ]2016-11-4_win9.passivedns2016-11-04 16:17 40K 
[   ]2016-11-4_win9.pcap2016-11-04 15:59 108M 
[   ]2016-11-4_win9.tcpdstat2016-11-04 16:17 2.0K 
[   ]2016-11-4_win9.uniargus2016-11-04 16:17 106M 
[   ]2016-11-4_win9.uninetflow2016-11-04 16:18 73M 
[   ]2016-11-4_win9.weblogng2016-11-04 16:17 194K 
[TXT]README.html2017-01-13 14:08 2.2K 
[TXT]README.md2016-11-04 16:50 1.5K 
[DIR]bro/2017-08-31 09:45 -  
[   ]e941689966213b42ed626de6f8b1ca56347f1e948370cacd51c8d1122a2e96d9.exe.zip2016-11-04 22:00 542K 
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:08 15K 
[   ]mitm.out2016-11-04 09:38 23M 

Description

Files

IP Addresses

- Infected host: 192.168.1.119
- Default GW: 192.168.1.2

Timeline

Thu Oct 20 20:09:06 CEST 2016

started win9

Thu Oct 20 20:12:48 CEST 2016

infected

Fri Nov 4 15:59:33 CET 2016

power off