Index of /publicDatasets/CTU-Malware-Capture-Botnet-203-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-11-24_win8.biargus2016-11-24 19:51 127M 
[   ]2016-11-24_win8.binetflow2016-11-24 19:52 86M 
[   ]2016-11-24_win8.capinfos2016-11-24 19:51 1.1K 
[   ]2016-11-24_win8.dnstop2016-11-24 19:46 13K 
[   ]2016-11-24_win8.mitm.weblog2016-12-05 21:02 6.9M 
[   ]2016-11-24_win8.passivedns2016-11-24 19:46 65K 
[   ]2016-11-24_win8.pcap2016-11-24 19:33 867M 
[   ]2016-11-24_win8.rrd2016-11-24 19:35 8.0M 
[   ]2016-11-24_win8.tcpdstat2016-11-24 19:51 1.9K 
[   ]2016-11-24_win8.uniargus2016-11-24 19:52 513M 
[   ]2016-11-24_win8.uninetflow2016-11-24 19:53 333M 
[   ]2016-11-24_win8.weblogng2016-11-24 19:51 23M 
[   ]94335091159cb2da1cce72e379b10c2149bb87b3fd762619c6a76d138c9f9ff5.exe.zip2016-11-24 19:59 55K 
[TXT]README.html2017-01-13 14:03 2.2K 
[TXT]README.md2016-11-24 19:58 1.6K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:03 15K 
[   ]mitm.out2016-11-04 15:03 228M 

Description

Files

IP Addresses

- Infected host: 192.168.1.118
- Default GW: 192.168.1.2

Timeline

Tue Nov 1 18:55:15 CET 2016

started win8

Tue Nov 1 18:58:39 CET 2016

infected

(date here)

Thu Nov 24 19:33:18 CET 2016 power off