Index of /publicDatasets/CTU-Malware-Capture-Botnet-202-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-11-17_win20.biargus2016-11-17 18:49 25M 
[   ]2016-11-17_win20.binetflow2016-11-17 18:49 16M 
[   ]2016-11-17_win20.capinfos2016-11-17 18:49 1.1K 
[   ]2016-11-17_win20.dnstop2016-11-17 18:48 2.5K 
[TXT]2016-11-17_win20.html2016-11-17 19:23 364K 
[   ]2016-11-17_win20.json2016-11-17 19:23 19K 
[   ]2016-11-17_win20.mitm.weblog2017-01-11 12:57 952  
[   ]2016-11-17_win20.passivedns2016-11-17 18:48 2.4K 
[   ]2016-11-17_win20.pcap2016-11-17 18:39 232M 
[   ]2016-11-17_win20.rrd2016-11-17 18:36 8.0M 
[   ]2016-11-17_win20.tcpdstat2016-11-17 18:49 2.0K 
[   ]2016-11-17_win20.uniargus2016-11-17 18:49 101M 
[   ]2016-11-17_win20.uninetflow2016-11-17 18:49 67M 
[   ]2016-11-17_win20.weblogng2016-11-17 18:49 867  
[TXT]README.html2017-01-13 14:03 2.2K 
[TXT]README.md2017-09-27 17:20 1.6K 
[   ]b254308c497dc5d8208e3a5e0419b40f2732a7611a398532fa199b47223407fc.exe.zip2016-11-17 19:00 1.6M 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:03 68K 
[   ]mitm.out2016-11-08 15:23 7.3K 

Description

Files

IP Addresses

- Infected host: 192.168.1.130
- Default GW: 192.168.1.2

Timeline

Tue Nov 8 15:14:04 CET 2016

started win20

Tue Nov 8 15:22:50 CET 2016

infected

Thu Nov 17 18:39:10 CET 2016

power off