Index of /publicDatasets/CTU-Malware-Capture-Botnet-201-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-11-17_win15.biargus2016-11-17 17:58 31M 
[   ]2016-11-17_win15.binetflow2016-11-17 17:58 20M 
[   ]2016-11-17_win15.capinfos2016-11-17 17:58 1.1K 
[   ]2016-11-17_win15.dnstop2016-11-17 17:56 16K 
[TXT]2016-11-17_win15.html2016-11-17 19:09 47M 
[   ]2016-11-17_win15.json2016-11-17 19:09 100M 
[   ]2016-11-17_win15.mitm.weblog2017-01-11 12:57 100K 
[   ]2016-11-17_win15.passivedns2016-11-17 17:56 18K 
[   ]2016-11-17_win15.pcap2016-11-17 17:48 254M 
[   ]2016-11-17_win15.rrd2016-11-17 17:48 8.0M 
[   ]2016-11-17_win15.tcpdstat2016-11-17 17:58 1.9K 
[   ]2016-11-17_win15.uniargus2016-11-17 17:58 213M 
[   ]2016-11-17_win15.uninetflow2016-11-17 17:58 145M 
[   ]2016-11-17_win15.weblogng2016-11-17 17:58 35K 
[TXT]README.html2017-01-13 14:03 2.3K 
[TXT]README.md2016-11-17 18:09 1.6K 
[   ]abad3a6610dae56190a29bab54952ce4920c81db9176155b08f656788ddc0099.exe.zip2016-11-17 18:06 246K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:03 45K 
[   ]mitm.out2016-11-10 21:55 226M 
[DIR]test/2017-12-19 12:03 -  

Description

Files

IP Addresses

- Infected host: 192.168.1.125
- Default GW: 192.168.1.2

Timeline

Wed Oct 19 17:45:28 CEST 2016

started win15

Wed Oct 19 17:47:59 CEST 2016

infected

Thu Nov 10 20:00:18 CET 2016 clicked "Next", Then Accept installation

Thu Nov 17 17:48:31 CET 2016

power off