Index of /publicDatasets/CTU-Malware-Capture-Botnet-211-2

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]59da0505b981f62df58c541e51c0be54.exe2016-12-26 16:13 1.7M 
[   ]59da0505b981f62df58c541e51c0be54.zip2017-02-03 16:58 1.6M 
[   ]2017-03-02_win2.biargus2017-02-03 16:53 18M 
[   ]2017-03-02_win2.binetflow2017-02-03 16:53 10M 
[   ]2017-03-02_win2.capinfos2017-02-03 16:41 1.1K 
[   ]2017-03-02_win2.dnstop2017-02-03 16:19 8.5K 
[TXT]2017-03-02_win2.html2017-02-03 19:08 396K 
[   ]2017-03-02_win2.json2017-02-03 19:08 67K 
[   ]2017-03-02_win2.mitm.weblog2017-02-03 16:58 67K 
[   ]2017-03-02_win2.passivedns2017-02-03 16:23 13K 
[   ]2017-03-02_win2.pcap2017-02-03 15:59 27G 
[   ]2017-03-02_win2.tcpdstat2017-02-03 16:49 2.0K 
[   ]2017-03-02_win2.uniargus2017-02-03 16:57 679M 
[   ]2017-03-02_win2.uninetflow2017-02-03 16:58 263M 
[   ]2017-03-02_win2.weblogng2017-02-03 16:45 64K 
[TXT]README.html2017-02-03 18:42 3.0K 
[TXT]README.md2017-02-03 18:42 2.3K 
[   ]Win2-test.rrd2017-02-03 15:58 8.0M 
[DIR]bro/2017-02-03 16:32 -  
[TXT]fast-flux-dga-first-analysis.txt2017-02-03 16:58 14K 
[   ]mitm.out2017-02-03 08:20 1.3M 

Description

Files

IP Addresses

- Infected host: 192.168.1.112
- Default GW: 192.168.1.2

Timeline

Mon Dec 26 16:09:37 CET 2016

started win2

Mon Dec 26 16:12:08 CET 2016

infected

Fri Feb 3 15:59:05 CET 2017

power off