Index of /publicDatasets/CTU-Malware-Capture-Botnet-206-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-12-02_win2.biargus2016-12-02 20:46 307M 
[   ]2016-12-02_win2.binetflow2016-12-02 20:47 115M 
[   ]2016-12-02_win2.capinfos2016-12-02 20:40 1.1K 
[   ]2016-12-02_win2.dnstop2016-12-02 20:31 3.2K 
[TXT]2016-12-02_win2.html2016-12-02 21:01 664K 
[   ]2016-12-02_win2.json2016-12-02 21:01 323K 
[   ]2016-12-02_win2.mitm.weblog2016-12-05 20:59 4.2K 
[   ]2016-12-02_win2.passivedns2016-12-02 20:31 4.0K 
[   ]2016-12-02_win2.pcap2016-12-02 20:22 1.1G 
[   ]2016-12-02_win2.rrd2016-12-02 20:21 8.0M 
[   ]2016-12-02_win2.tcpdstat2016-12-02 20:46 2.1K 
[   ]2016-12-02_win2.uniargus2016-12-02 20:47 850M 
[   ]2016-12-02_win2.uninetflow2016-12-02 20:49 416M 
[   ]2016-12-02_win2.weblogng2016-12-02 20:41 164M 
[TXT]README.html2017-01-13 14:03 2.2K 
[TXT]README.md2016-12-02 20:55 1.5K 
[DIR]bro/2017-08-31 09:45 -  
[   ]f4d58d179b9921917096c4df0bc7686dbbed6ae048eb5f4a9c65e5703b2c2fc3.exe.zip2016-12-02 20:55 246K 
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:03 9.8K 
[   ]mitm.out2016-10-27 00:51 226K 
[   ]salida.weblog2016-12-05 14:20 3.8K 

Description

Files

IP Addresses

- Infected host: 192.168.1.112
- Default GW: 192.168.1.2

Timeline

Tue Oct 25 00:42:16 CEST 2016

started win2

Tue Oct 25 01:12:27 CEST 2016

infected

Fri Dec 2 20:21:56 CET 2016

power off