Index of /publicDatasets/CTU-Malware-Capture-Botnet-199-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]mitm.out2016-11-04 19:51 22M 
[   ]2016-11-4_win12.pcap2016-11-04 22:30 617M 
[   ]2016-11-4_win12.rrd2016-11-04 22:30 8.0M 
[   ]2016-11-4_win12.dnstop2016-11-04 22:35 18K 
[   ]2016-11-4_win12.passivedns2016-11-04 22:35 43K 
[   ]2016-11-4_win12.capinfos2016-11-04 22:37 1.1K 
[   ]2016-11-4_win12.weblogng2016-11-04 22:37 62K 
[   ]2016-11-4_win12.tcpdstat2016-11-04 22:38 2.8K 
[   ]2016-11-4_win12.biargus2016-11-04 22:38 88M 
[   ]2016-11-4_win12.binetflow2016-11-04 22:38 50M 
[TXT]README.md2016-11-04 22:45 1.7K 
[   ]36df97819e69ad684acdf7f09021b8c9e4a2a447c651c7bbe26077d5d4303d4b.exe.zip2016-11-04 22:46 436K 
[   ]2016-11-4_win12.mitm.weblog2016-12-05 21:15 153K 
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:03 40K 
[TXT]README.html2017-01-13 14:03 2.3K 
[DIR]bro/2017-08-31 09:45 -  
[   ]2016-11-4_win12.json2017-09-22 17:06 59M 
[TXT]2016-11-4_win12.html2017-09-22 17:06 28M 

Description

Files

IP Addresses

- Infected host: 192.168.1.122
- Default GW: 192.168.1.2

Timeline

Wed Oct 19 17:24:23 CEST 2016

started win12

Wed Oct 19 17:28:31 CEST 2016

infected clicked, nothing happens

Wed Oct 19 17:29:44 CEST 2016 clicked again.. Instalation wizard appears.. Downloading files to install

Fri Nov 4 22:29:48 CET 2016

power off