Index of /publicDatasets/CTU-Malware-Capture-Botnet-210-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]53ab071876dd528939b770eec5371681c3ff5a0ceca8774c4efe4f129392e885.exe.zip2016-12-13 15:49 12M 
[   ]2016-12-05_win9.biargus2016-12-13 15:43 2.7M 
[   ]2016-12-05_win9.binetflow2016-12-13 15:43 1.7M 
[   ]2016-12-05_win9.capinfos2016-12-13 15:43 1.1K 
[   ]2016-12-05_win9.dnstop2016-12-13 15:43 3.9K 
[   ]2016-12-05_win9.mitm.weblog2016-12-13 15:43 25K 
[   ]2016-12-05_win9.passivedns2016-12-13 15:43 6.5K 
[   ]2016-12-05_win9.pcap2016-12-05 09:57 25M 
[   ]2016-12-05_win9.rrd2016-12-05 09:57 8.0M 
[   ]2016-12-05_win9.tcpdstat2016-12-13 15:43 1.8K 
[   ]2016-12-05_win9.uniargus2016-12-13 15:43 38M 
[   ]2016-12-05_win9.uninetflow2016-12-13 15:43 22M 
[   ]2016-12-05_win9.weblogng2016-12-13 15:43 232  
[TXT]README.html2017-01-13 14:02 2.2K 
[TXT]README.md2016-12-13 15:48 1.5K 
[DIR]bro/2016-12-17 16:20 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 11:22 8.0K 
[   ]mitm.out2016-12-05 08:40 468K 

Description

Files

IP Addresses

- Infected host: 192.168.1.119
- Default GW: 192.168.1.2

Timeline

Thu Dec 1 16:32:11 CET 2016

started win9

Thu Dec 1 16:35:56 CET 2016

infected

Mon Dec 5 09:57:31 CET 2016

power off