Index of /publicDatasets/CTU-Malware-Capture-Botnet-213-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]618fdcc08c81acc946ed078f651f40070566b7866e34f5a2847d863bd2043b80.exe.zip2016-12-22 15:47 2.2M 
[   ]2016-12-22_win5.biargus2016-12-22 15:31 15M 
[   ]2016-12-22_win5.binetflow2016-12-22 15:31 9.1M 
[   ]2016-12-22_win5.capinfos2016-12-22 15:31 1.1K 
[   ]2016-12-22_win5.dnstop2016-12-22 15:30 15K 
[TXT]2016-12-22_win5.html2016-12-22 15:55 15M 
[   ]2016-12-22_win5.json2016-12-22 15:55 21M 
[   ]2016-12-22_win5.mitm.weblog2016-12-22 15:31 1.2M 
[   ]2016-12-22_win5.passivedns2016-12-22 15:30 91K 
[   ]2016-12-22_win5.pcap2016-12-22 15:24 109M 
[   ]2016-12-22_win5.rrd2016-12-22 15:24 8.0M 
[   ]2016-12-22_win5.tcpdstat2016-12-22 15:31 2.1K 
[   ]2016-12-22_win5.uniargus2016-12-22 15:31 80M 
[   ]2016-12-22_win5.uninetflow2016-12-22 15:31 54M 
[   ]2016-12-22_win5.weblogng2016-12-22 15:31 1.2M 
[TXT]README.html2017-01-13 14:02 3.0K 
[TXT]README.md2016-12-22 16:48 2.3K 
[DIR]bro/2016-12-22 15:31 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 11:22 51K 
[   ]mitm.out2016-12-22 14:43 15M 

Description

Files

IP Addresses

- Infected host: 192.168.1.115
- Default GW: 192.168.1.2

Timeline

Tue Dec 13 16:56:03 CET 2016

started win5

Tue Dec 13 16:59:29 CET 2016

infected

Thu Dec 22 15:23:58 CET 2016

power off