Index of /publicDatasets/CTU-Malware-Capture-Botnet-211-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2016-12-05_win16.biargus2016-12-13 16:34 18M 
[   ]2016-12-05_win16.binetflow2016-12-13 16:34 12M 
[   ]2016-12-05_win16.capinfos2016-12-13 16:28 1.1K 
[   ]2016-12-05_win16.dnstop2016-12-13 16:21 5.5K 
[   ]2016-12-05_win16.mitm.weblog2016-12-13 16:38 30K 
[   ]2016-12-05_win16.passivedns2016-12-13 16:23 6.8K 
[   ]2016-12-05_win16.pcap2016-12-05 09:57 12G 
[   ]2016-12-05_win16.rrd2016-12-05 09:57 8.0M 
[   ]2016-12-05_win16.tcpdstat2016-12-13 16:32 1.9K 
[   ]2016-12-05_win16.uniargus2016-12-13 16:37 346M 
[   ]2016-12-05_win16.uninetflow2016-12-13 16:38 146M 
[   ]2016-12-05_win16.weblogng2016-12-13 16:30 28K 
[   ]369307cc4b4de620a57961d3863f2a907a1583c03d8bcbacc03293c9f01abdb4.exe.zip2016-12-13 16:47 1.6M 
[TXT]README.html2017-01-13 14:02 2.2K 
[TXT]README.md2016-12-13 16:46 1.5K 
[DIR]bro/2016-12-17 16:28 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:02 9.3K 
[   ]mitm.out2016-12-05 05:53 224K 

Description

Files

IP Addresses

- Infected host: 192.168.1.126
- Default GW: 192.168.1.2

Timeline

Thu Nov 17 16:49:57 CET 2016

started win16

Thu Nov 17 16:52:33 CET 2016

infected

Mon Dec 5 09:57:31 CET 2016

power off