Index of /publicDatasets/CTU-Malware-Capture-Botnet-208-2

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-12-30_win3.biargus2016-12-30 17:05 31M 
[   ]2016-12-30_win3.binetflow2016-12-30 17:05 18M 
[   ]2016-12-30_win3.capinfos2016-12-30 17:05 1.1K 
[   ]2016-12-30_win3.dnstop2016-12-30 17:05 23K 
[   ]2016-12-30_win3.passivedns2016-12-30 17:05 189K 
[   ]2016-12-30_win3.pcap2016-12-30 16:44 223M 
[   ]2016-12-30_win3.rrd2016-12-30 16:44 8.0M 
[   ]2016-12-30_win3.tcpdstat2016-12-30 17:05 2.3K 
[   ]2016-12-30_win3.weblogng2016-12-30 17:05 1.3M 
[TXT]README.html2017-03-10 14:33 3.0K 
[TXT]README.md2016-12-30 17:12 2.3K 
[DIR]bro/2017-03-10 14:37 -  
[   ]e1557810adb59597366d167efcd85a09d0ae2827f49ef6b8e6a459e56d6e1292.exe.zip2016-12-30 17:13 2.2M 
[TXT]fast-flux-dga-first-analysis.txt2017-01-15 16:17 196  

Description

Files

IP Addresses

- Infected host: 192.168.1.113
- Default GW: 192.168.1.2

Timeline

Mon Dec 12 16:03:11 CET 2016

started win3

Mon Dec 12 16:06:53 CET 2016

infected

Fri Dec 30 16:44:19 CET 2016

power off