Index of /publicDatasets/CTU-Malware-Capture-Botnet-197-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-11-4_win10.biargus2016-11-04 21:41 11M 
[   ]2016-11-4_win10.binetflow2016-11-04 21:41 7.2M 
[   ]2016-11-4_win10.capinfos2016-11-04 21:41 1.1K 
[   ]2016-11-4_win10.dnstop2016-11-04 21:40 5.6K 
[TXT]2016-11-4_win10.html2016-11-04 21:55 1.0M 
[   ]2016-11-4_win10.json2016-11-04 21:55 1.3M 
[   ]2016-11-4_win10.mitm.weblog2016-12-05 21:39 8.5K 
[   ]2016-11-4_win10.passivedns2016-11-04 21:40 4.8K 
[   ]2016-11-4_win10.pcap2016-11-04 21:02 91M 
[   ]2016-11-4_win10.rrd2016-11-04 21:02 8.0M 
[   ]2016-11-4_win10.tcpdstat2016-11-04 21:41 1.8K 
[   ]2016-11-4_win10.uniargus2016-11-04 21:41 114M 
[   ]2016-11-4_win10.uninetflow2016-11-04 21:41 78M 
[   ]2016-11-4_win10.weblogng2016-11-04 21:41 7.4K 
[   ]19624938bd72b7d41a56ee82b39c81700a941f569c1a1d3924c7668cc34cf77e.exe.zip2016-11-04 21:54 5.5M 
[TXT]README.html2017-01-13 14:08 2.2K 
[TXT]README.md2016-11-04 21:58 1.5K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:08 11K 
[   ]mitm.out2016-10-19 17:19 707K 

Description

Files

IP Addresses

- Infected host: 192.168.1.120
- Default GW: 192.168.1.2

Timeline

Wed Oct 19 17:12:33 CEST 2016

started win10

Wed Oct 19 17:17:40 CEST 2016

infected

Fri Nov 4 21:02:07 CET 2016

power off