Index of /publicDatasets/CTU-Malware-Capture-Botnet-229-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2017-2-27_win14.biargus2017-03-06 15:05 42M 
[   ]2017-2-27_win14.binetflow2017-03-06 15:05 20M 
[   ]2017-2-27_win14.capinfos2017-03-06 15:05 1.1K 
[   ]2017-2-27_win14.dnstop2017-03-06 15:02 1.6K 
[   ]2017-2-27_win14.mitm.weblog2017-03-06 15:05 287  
[   ]2017-2-27_win14.passivedns2017-03-06 15:02 1.1K 
[   ]2017-2-27_win14.pcap2017-02-27 11:26 183M 
[   ]2017-2-27_win14.rrd2017-02-27 11:25 8.0M 
[   ]2017-2-27_win14.tcpdstat2017-03-06 15:05 1.9K 
[   ]2017-2-27_win14.uniargus2017-03-06 15:05 166M 
[   ]2017-2-27_win14.uninetflow2017-03-06 15:05 98M 
[   ]2017-2-27_win14.weblogng2017-03-06 15:05 232  
[   ]30745a82b9419cf79a5d0b1bab47da66.zip2017-03-06 15:07 343K 
[TXT]README.html2017-03-06 15:13 3.0K 
[TXT]README.md2017-03-06 15:12 2.3K 
[DIR]bro/2017-03-06 15:05 -  
[TXT]fast-flux-dga-first-analysis.txt2017-03-06 15:07 83K 
[   ]mitm.out2017-02-14 15:36 0  

Description

Files

IP Addresses

- Infected host: 192.168.1.224
- Default GW: 192.168.1.2

Timeline

Tue Feb 14 15:34:48 CET 2017

started win14

Tue Feb 14 15:37:02 CET 2017

infected

Mon 27 Feb 11:25:59 CET 2017

power off