Index of /publicDatasets/CTU-Malware-Capture-Botnet-209-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[DIR]bro/2016-12-17 16:17 -  
[TXT]second.html2017-01-16 21:43 296  
[TXT]first.html2017-01-16 21:43 700  
[   ]2016-12-05_win13.capinfos2016-12-13 15:09 1.1K 
[TXT]README.md2016-12-13 15:28 1.5K 
[   ]2016-12-05_win13.tcpdstat2016-12-13 15:09 1.9K 
[TXT]README.html2017-01-13 14:03 2.2K 
[TXT]README3.html2017-01-16 22:00 5.0K 
[TXT]vis-network.min.css2017-01-16 21:43 15K 
[   ]2016-12-05_win13.dnstop2016-12-13 15:09 18K 
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:03 45K 
[   ]2016-12-05_win13.passivedns2016-12-13 15:09 63K 
[   ]2016-12-05_win13.weblogng2016-12-13 15:09 153K 
[   ]2016-12-05_win13.mitm.weblog2016-12-13 15:10 196K 
[   ]vis.js2017-01-16 21:43 1.6M 
[   ]2016-12-05_win13.rrd2016-12-05 09:57 8.0M 
[   ]2016-12-05_win13.binetflow2016-12-13 15:09 13M 
[   ]mitm.out2016-12-04 17:15 14M 
[   ]f3669f7c5ee635b4ae6b087b4655ba95b7a2e5360c495f1f34818571a9bc4e2c.exe.zip2016-12-13 15:24 16M 
[   ]2016-12-05_win13.biargus2016-12-13 15:09 20M 
[   ]2016-12-05_win13.pcap2016-12-05 09:57 132M 

Description

Files

IP Addresses

- Infected host: 192.168.1.123
- Default GW: 192.168.1.2

Timeline

Nov 16 15:52:27 CET 2016

started win13

Wed Nov 16 15:54:15 CET 2016

infected

Mon Dec 5 09:57:31 CET 2016

power off