Index of /publicDatasets/CTU-Malware-Capture-Botnet-232-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]0f9de35d1871a1dc5beeef9f5f312e45.zip2017-03-13 20:33 714K 
[   ]2017-02-27_win18.biargus2017-03-13 20:30 20M 
[   ]2017-02-27_win18.binetflow2017-03-13 20:30 12M 
[   ]2017-02-27_win18.capinfos2017-03-13 20:30 1.1K 
[   ]2017-02-27_win18.dnstop2017-03-13 20:27 18K 
[TXT]2017-02-27_win18.html2017-03-13 20:38 32M 
[   ]2017-02-27_win18.json2017-03-13 20:38 67M 
[   ]2017-02-27_win18.mitm.weblog2017-03-13 20:31 3.7M 
[   ]2017-02-27_win18.passivedns2017-03-13 20:27 73K 
[   ]2017-02-27_win18.pcap2017-02-27 11:26 314M 
[   ]2017-02-27_win18.rrd2017-02-27 11:26 8.0M 
[   ]2017-02-27_win18.tcpdstat2017-03-13 20:30 2.1K 
[   ]2017-02-27_win18.uniargus2017-03-13 20:30 143M 
[   ]2017-02-27_win18.uninetflow2017-03-13 20:30 89M 
[   ]2017-02-27_win18.weblogng2017-03-13 20:30 94K 
[TXT]README.html2017-03-13 20:37 3.0K 
[TXT]README.md2017-03-13 20:37 2.3K 
[   ]block.log2018-03-19 14:10 285  
[DIR]bro/2017-03-13 20:30 -  
[DIR]bro2/2018-09-19 13:27 -  
[TXT]fast-flux-dga-first-analysis.txt2017-03-13 20:33 122K 
[DIR]logs/2018-03-19 14:10 -  
[   ]mitm.out2017-02-27 11:19 154M 
[   ]slips.log2018-03-19 14:09 0  

Description

Files

IP Addresses

- Infected host: 192.168.1.128
- Default GW: 192.168.1.2

Timeline

Wed Feb 15 20:42:42 CET 2017

started win18

Wed Feb 15 20:44:33 CET 2017

infected

Mon 27 Feb 11:26:11 CET 2017

power off