Index of /publicDatasets/CTU-Malware-Capture-Botnet-224-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]mitm.out2017-02-27 11:19 1.3M 
[TXT]fast-flux-dga-first-analysis.txt2017-03-01 08:01 8.1K 
[   ]capture_win11.weblogng2017-03-01 08:00 232  
[   ]capture_win11.tcpdstat2017-03-01 08:00 1.7K 
[   ]capture_win11.pcap2017-02-27 11:26 52M 
[   ]capture_win11.passivedns2017-03-01 08:00 1.4K 
[   ]capture_win11.mitm.weblog2017-03-01 08:01 140K 
[   ]capture_win11.dnstop2017-03-01 08:00 3.4K 
[   ]capture_win11.capinfos2017-03-01 08:00 1.1K 
[   ]capture_win11.binetflow2017-03-01 08:01 2.4M 
[   ]capture_win11.biargus2017-03-01 08:01 3.8M 
[DIR]bro/2017-03-01 09:16 -  
[   ]Win11-test.rrd2017-02-27 11:26 8.0M 
[TXT]README.md2017-03-01 09:13 2.4K 
[TXT]README.html2017-03-01 09:13 3.1K 
[   ]18766840553512d3d80249e5c8ddcf16.zip2017-03-01 08:54 182K 

Description

Files

IP Addresses

- Infected host: 192.168.1.121
- Infected host local ipv6: fd2d:ab8c:225:0:46a:c1a7:8a4b:1942
- Default GW: 192.168.1.2

Timeline

Fri Feb 24 15:18:25 CET 2017

started winX

Fri Feb 24 15:22:47 CET 2017

infected

Fri Feb 27 (see duration)

power off