Index of /publicDatasets/CTU-Malware-Capture-Botnet-228-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]mitm.out2017-02-27 11:21 2.8M 
[   ]2017-2-27_win13.rrd2017-02-27 11:25 8.0M 
[   ]2017-2-27_win13.pcap2017-02-27 11:26 57M 
[   ]2017-2-27_win13.dnstop2017-03-06 14:44 2.8K 
[   ]2017-2-27_win13.passivedns2017-03-06 14:44 1.3K 
[DIR]bro/2017-03-06 14:45 -  
[   ]2017-2-27_win13.capinfos2017-03-06 14:45 1.1K 
[   ]2017-2-27_win13.weblogng2017-03-06 14:45 232  
[   ]2017-2-27_win13.tcpdstat2017-03-06 14:45 1.7K 
[   ]2017-2-27_win13.biargus2017-03-06 14:45 4.1M 
[   ]2017-2-27_win13.binetflow2017-03-06 14:45 2.5M 
[   ]2017-2-27_win13.uniargus2017-03-06 14:45 29M 
[   ]2017-2-27_win13.uninetflow2017-03-06 14:45 20M 
[   ]2017-2-27_win13.mitm.weblog2017-03-06 14:45 155K 
[TXT]fast-flux-dga-first-analysis.txt2017-03-06 14:47 51K 
[   ]81e94ac247fecb32add3a666d11beb9e.zip2017-03-06 14:47 101K 
[TXT]README.html2017-03-06 14:47 3.0K 
[TXT]README.md2017-03-06 14:51 2.3K 

Description

Files

IP Addresses

- Infected host: 192.168.1.123
- Default GW: 192.168.1.2

Timeline

Fri Feb 24 15:01:01 CET 2017

started winX

Fri Feb 24 15:12:24 CET 2017

infected

(date here)

power off