Index of /publicDatasets/CTU-Malware-Capture-Botnet-200-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-11-8_win14.biargus2016-11-08 14:46 16M 
[   ]2016-11-8_win14.binetflow2016-11-08 14:46 11M 
[   ]2016-11-8_win14.capinfos2016-11-08 14:46 1.1K 
[   ]2016-11-8_win14.dnstop2016-11-08 14:45 6.3K 
[   ]2016-11-8_win14.mitm.weblog2017-01-11 12:57 9.5K 
[   ]2016-11-8_win14.passivedns2016-11-08 14:45 5.4K 
[   ]2016-11-8_win14.pcap2016-11-08 14:38 114M 
[   ]2016-11-8_win14.rrd2016-11-08 14:38 8.0M 
[   ]2016-11-8_win14.tcpdstat2016-11-08 14:46 1.9K 
[   ]2016-11-8_win14.uniargus2016-11-08 14:46 138M 
[   ]2016-11-8_win14.uninetflow2016-11-08 14:47 95M 
[   ]2016-11-8_win14.weblogng2016-11-08 14:46 4.6K 
[TXT]README.html2017-01-13 14:03 2.2K 
[TXT]README.md2016-11-08 14:55 1.5K 
[   ]a887ac60e53585ec935a4bd6e77f8b9c58c4e63f26e03f0a0f1144babc1525b2.exe.zip2016-11-08 14:56 1.6M 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:03 12K 
[   ]mitm.out2016-10-19 17:44 1.0M 

Description

Files

IP Addresses

- Infected host: 192.168.1.124
- Default GW: 192.168.1.2

Timeline

Wed Oct 19 17:39:57 CEST 2016

started win14

Wed Oct 19 17:43:05 CEST 2016

infected

Tue Nov 8 14:38:21 CET 2016

power off