Index of /publicDatasets/CTU-Malware-Capture-Botnet-198-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]8a6fead2bc394b5b2d42a907dfdb1bd1776342831dfa40950bf479fc1ab6a63d.exe.zip2016-11-04 22:18 4.2M 
[   ]2016-11-4_win11.biargus2016-11-04 22:11 19M 
[   ]2016-11-4_win11.binetflow2016-11-04 22:11 12M 
[   ]2016-11-4_win11.capinfos2016-11-04 22:11 1.1K 
[   ]2016-11-4_win11.dnstop2016-11-04 22:10 11K 
[TXT]2016-11-4_win11.html2016-12-05 21:18 556K 
[   ]2016-11-4_win11.json2016-12-05 21:18 230K 
[   ]2016-11-4_win11.mitm.weblog2016-12-05 21:15 144K 
[   ]2016-11-4_win11.passivedns2016-11-04 22:10 538K 
[   ]2016-11-4_win11.pcap2016-11-04 22:04 384M 
[   ]2016-11-4_win11.rrd2016-11-04 22:04 8.0M 
[   ]2016-11-4_win11.tcpdstat2016-11-04 22:11 2.2K 
[   ]2016-11-4_win11.uniargus2016-11-04 22:11 205M 
[   ]2016-11-4_win11.uninetflow2016-11-04 22:12 129M 
[   ]2016-11-4_win11.weblogng2016-11-04 22:11 9.1K 
[TXT]README.html2017-01-13 14:07 1.9K 
[TXT]README.md2016-11-04 22:18 1.3K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:07 1.4M 
[   ]mitm.out2016-11-03 20:55 310M 

Description

Files

IP Addresses

- Infected host: 192.168.1.121
- Default GW: 192.168.1.2

Timeline

Tue Oct 11 17:11:14 CEST 2016

started win11

Tue Oct 11 17:14:42 CEST 2016

infected

Fri Nov 4 22:04:21 CET 2016

power off