Index of /publicDatasets/CTU-Malware-Capture-Botnet-199-2

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]36df97819e69ad684acdf7f09021b8c9e4a2a447c651c7bbe26077d5d4303d4b.exe.zip2016-12-05 21:25 436K 
[   ]2016-11-17_win17.biargus2016-11-17 18:24 25M 
[   ]2016-11-17_win17.binetflow2016-11-17 18:24 16M 
[   ]2016-11-17_win17.capinfos2016-11-17 18:24 1.1K 
[   ]2016-11-17_win17.dnstop2016-11-17 18:22 3.6K 
[   ]2016-11-17_win17.passivedns2016-11-17 18:22 4.0K 
[   ]2016-11-17_win17.pcap2016-11-17 18:19 117M 
[   ]2016-11-17_win17.rrd2016-11-17 18:16 8.0M 
[   ]2016-11-17_win17.tcpdstat2016-11-17 18:24 1.9K 
[   ]2016-11-17_win17.weblogng2016-11-17 18:24 805  
[TXT]README.html2017-01-15 16:28 2.2K 
[TXT]README.md2016-11-17 18:29 1.5K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-15 16:18 4.5K 

Description

Files

IP Addresses

- Infected host: 192.168.1.127
- Default GW: 192.168.1.2

Timeline

Mon Oct 31 14:54:39 CET 2016

started win17

Mon Oct 31 14:59:40 CET 2016

infected

Thu Nov 17 18:19:24 CET 2016

power off