Index of /publicDatasets/CTU-Malware-Capture-Botnet-219-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[TXT]README.html2017-06-30 10:17 3.1K 
[TXT]README.md2017-06-30 10:17 2.4K 
[   ]Win9-test.rrd2017-02-14 09:06 8.0M 
[DIR]bro/2017-02-14 09:06 -  
[   ]capture_win9.biargus2017-02-14 09:06 8.7M 
[   ]capture_win9.binetflow2017-02-14 09:06 3.2M 
[   ]capture_win9.capinfos2017-02-14 09:06 1.1K 
[   ]capture_win9.dnstop2017-02-14 09:05 3.0K 
[   ]capture_win9.mitm.weblog2017-02-14 09:06 3.0K 
[   ]capture_win9.passivedns2017-02-14 09:05 3.0K 
[   ]capture_win9.pcap2017-02-14 09:03 31M 
[   ]capture_win9.tcpdstat2017-02-14 09:06 2.0K 
[   ]capture_win9.uniargus2017-02-14 09:06 20M 
[   ]capture_win9.uninetflow2017-02-14 09:06 8.3M 
[   ]capture_win9.weblogng2017-02-14 09:06 3.0M 
[TXT]fast-flux-dga-first-analysis.txt2017-02-14 09:06 4.7K 
[   ]ffa8b967c6421fd710adc07708751cc8be81d9e3b00e27d506ea9a44b1b7e359.zip2017-02-14 09:06 305K 
[   ]mitm.out2017-02-13 20:15 164K 
[DIR]suricata/2017-06-30 10:14 -  

Description

Files

IP Addresses

- Infected host: 192.168.1.119
- Default GW: 192.168.1.1

Timeline

Mon Feb 13 20:08:48 CET 2017

started win9

Mon Feb 13 20:09:48 CET 2017

infected

Tue Feb 14 09:03:09 CET 2017

power off