Index of /publicDatasets/CTU-Malware-Capture-Botnet-214-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]1a45085e959a449637a89174b1737f4d03d7e73dd7acfa3cfb96042a735cf400.exe.zip2016-12-30 14:09 101K 
[   ]2016-12-30_win12.biargus2016-12-30 13:54 71M 
[   ]2016-12-30_win12.binetflow2016-12-30 13:54 38M 
[   ]2016-12-30_win12.capinfos2016-12-30 13:54 1.1K 
[   ]2016-12-30_win12.dnstop2016-12-30 13:54 24K 
[   ]2016-12-30_win12.mitm.weblog2016-12-30 13:55 1.6M 
[   ]2016-12-30_win12.passivedns2016-12-30 13:54 5.1K 
[   ]2016-12-30_win12.pcap2016-12-30 13:48 259M 
[   ]2016-12-30_win12.rrd2016-12-30 13:50 8.0M 
[   ]2016-12-30_win12.tcpdstat2016-12-30 13:54 1.9K 
[   ]2016-12-30_win12.uniargus2016-12-30 13:55 265M 
[   ]2016-12-30_win12.uninetflow2016-12-30 13:55 164M 
[   ]2016-12-30_win12.weblogng2016-12-30 13:54 14M 
[TXT]README.html2017-01-13 14:02 3.0K 
[TXT]README.md2016-12-30 14:15 2.3K 
[DIR]bro/2017-02-12 16:36 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-13 14:02 14K 
[   ]mitm.out2016-12-30 13:48 15M 

Description

Files

IP Addresses

- Infected host: 192.168.1.122
- Default GW: 192.168.1.2

Timeline

Thu Dec 15 16:23:14 CET 2016

started win12

Thu Dec 15 16:28:01 CET 2016

infected

Fri Dec 30 13:48:06 CET 2016

power off